Sciweavers

1162 search results - page 123 / 233
» Requirements for Routing in the Application Layer
Sort
View
CHES
2005
Springer
96views Cryptology» more  CHES 2005»
14 years 1 months ago
The "Backend Duplication" Method
Abstract. Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called “backend duplication” to a...
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu,...
DATE
2002
IEEE
144views Hardware» more  DATE 2002»
14 years 1 months ago
Design Automation for Deepsubmicron: Present and Future
Advancing technology drives design technology and thus design automation EDA. How to model interconnect, how to handle degradation of signal integrity and increasing power densi...
Ralph H. J. M. Otten, Raul Camposano, Patrick Groe...
ICNP
1999
IEEE
14 years 12 days ago
WDM Multicasting in IP over WDM Networks
Supporting WDM multicasting in an IP over WDM network poses interesting problems because some WDM switches may be incapable of switching an incoming signal to more than one output...
Chunming Qiao, Myoungki Jeong, Amit Guha, Xijun Zh...
CCR
2007
176views more  CCR 2007»
13 years 8 months ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre
SEMWEB
2009
Springer
14 years 2 months ago
A Database Backend for OWL
Abstract. Most Semantic Web applications are build on top of technology based on the Semantic Web layer cake and the W3C ontology languages RDF(S) and OWL. However RDF(S) embodies ...
Jörg Henss, Joachim Kleb, Stephan Grimm