Sciweavers

3340 search results - page 132 / 668
» Teaching networking hardware
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 5 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
RV
2009
Springer
101views Hardware» more  RV 2009»
15 years 10 months ago
DMaC: Distributed Monitoring and Checking
Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup ...
ICCAD
2005
IEEE
98views Hardware» more  ICCAD 2005»
16 years 27 days ago
Statistical based link insertion for robust clock network design
We present a statistical based non-tree clock distribution construction algorithm that starts with a tree and incrementally insert cross links, such that the skew variation of the...
Wai-Ching Douglas Lam, J. Jam, Cheng-Kok Koh, Venk...
ICCAD
2003
IEEE
113views Hardware» more  ICCAD 2003»
16 years 27 days ago
Branch Merge Reduction of RLCM Networks
— In this paper we consider the problem of finding a smaller RLCM circuit that approximately replicates the behavior (up to a certain frequency) of a given RLCM circuit. Targeted...
Bernard N. Sheehan
ICCAD
2002
IEEE
82views Hardware» more  ICCAD 2002»
16 years 27 days ago
Simplification of non-deterministic multi-valued networks
1 We discuss the simplification of non-deterministic MV networks and their internal nodes using internal flexibilities. Given the network structure and its external specification, ...
Alan Mishchenko, Robert K. Brayton