Sciweavers

974 search results - page 118 / 195
» Simulation blocks for TOSSIM-T2
Sort
View
123
Voted
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
15 years 9 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...
158
Voted
IPPS
2006
IEEE
15 years 9 months ago
Exploiting processing locality through paging configurations in multitasked reconfigurable systems
FPGA chips in reconfigurable computer systems are used as malleable coprocessors where components of a hardware library of functions can be configured as needed. As the number of ...
T. Taher, Tarek A. El-Ghazawi
150
Voted
SENSYS
2006
ACM
15 years 9 months ago
Datalink streaming in wireless sensor networks
Datalink layer framing in wireless sensor networks usually faces a trade-off between large frame sizes for high channel bandwidth utilization and small frame sizes for effective e...
Raghu K. Ganti, Praveen Jayachandran, Haiyun Luo, ...
139
Voted
SAINT
2005
IEEE
15 years 9 months ago
On Scalable Modeling of TCP Congestion Control Mechanism for Large-Scale IP Networks
In this paper, we propose an analytic approach of modeling a closed-loop network with multiple feedback loops using fluid-flow approximation. Specifically, we model building bl...
Hiroyuki Ohsaki, Juñya Ujiie, Makoto Imase
152
Voted
SIGCOMM
2004
ACM
15 years 9 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin