Sciweavers

732 search results - page 85 / 147
» Power minimization using control generated clocks
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
TWC
2010
13 years 3 months ago
Adaptive linearly constrained minimum variance beamforming for multiuser cooperative relaying using the kalman filter
In this paper, we consider a wireless communication scenario with multiple source-destination pairs communicating through several cooperative amplify-and-forward relay terminals. T...
Amr El-Keyi, Benoît Champagne
EMSOFT
2005
Springer
14 years 2 months ago
A sink-n-hoist framework for leakage power reduction
Power leakage constitutes an increasing fraction of the total power consumption in modern semiconductor technologies. Recent research efforts have tried to integrate architecture...
Yi-Ping You, Chung-Wen Huang, Jenq Kuen Lee
ICFP
2009
ACM
14 years 9 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
IEICET
2006
131views more  IEICET 2006»
13 years 8 months ago
Quick Data-Retrieving for U-APSD in IEEE802.11e WLAN Networks
The IEEE802.11e defines a MAC protocol, which provides EDCA (enhanced distributed channel access) and HCCA (HCF controlled channel access) to support differentiation service over W...
Shojiro Takeuchi, Kaoru Sezaki, Yasuhiko Yasuda