Sciweavers

488 search results - page 91 / 98
» REDUCE Meets CAMAL
Sort
View
TC
2008
13 years 6 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
TCAD
2008
81views more  TCAD 2008»
13 years 6 months ago
Optimizing Nonmonotonic Interconnect Using Functional Simulation and Logic Restructuring
The relatively poor scaling of interconnect in modern digital circuits necessitates a number of design optimizations, which must typically be iterated several times to meet the spe...
Stephen Plaza, Igor L. Markov, Valeria Bertacco
TR
2008
107views more  TR 2008»
13 years 6 months ago
A New Shared Segment Protection Method for Survivable Networks with Guaranteed Recovery Time
Shared Segment Protection (SSP), compared with Shared Path Protection (SPP), and Shared Link Protection (SLP), provides an optimal protection configuration due to the ability of ma...
János Tapolcai, Pin-Han Ho, Dominique Verch...
COMCOM
2000
82views more  COMCOM 2000»
13 years 6 months ago
Soft handoff in a CDMA wireless ATM environment
Future wireless asynchronous transfer mode (ATM) networks present a number of mobility related challenges. Handoffs due to user mobility require network signaling to maintain the ...
Steven Lombardi, Weihua Zhuang
CN
2002
74views more  CN 2002»
13 years 6 months ago
Dynamic buffer management scheme based on rate estimation in packet-switched networks
Abstract-- While traffic volume of real-time applications is rapidly increasing, current routers do not guarantee minimum QoS values of fairness and they drop packets in random fas...
Jeong-woo Cho, Dong-Ho Cho