Sciweavers

2358 search results - page 392 / 472
» Revisiting communication performance models for computationa...
Sort
View
CODES
2004
IEEE
14 years 19 days ago
Multi-objective mapping for mesh-based NoC architectures
In this paper we present an approach to multi-objective exploration of the mapping space of a mesh-based network-on-chip architecture. Based on evolutionary computing techniques, ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
14 years 19 days ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
SNPD
2007
13 years 10 months ago
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks
Source and destination location privacy is a challenging and important problem in sensor networks. Nevertheless, privacy preserving communication in sensor networks is still a vir...
Yingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai ...
CORR
2006
Springer
107views Education» more  CORR 2006»
13 years 9 months ago
The Multiple Access Channel with Feedback and Correlated Sources
Abstract-- In this paper, we investigate communication strategies for the multiple access channel with feedback and correlated sources (MACFCS). The MACFCS models a wireless sensor...
Lawrence Ong, Mehul Motani
IJISEC
2008
92views more  IJISEC 2008»
13 years 9 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk