Sciweavers

2624 search results - page 477 / 525
» The 2LIP model and its implementations
Sort
View
ISCC
2006
IEEE
113views Communications» more  ISCC 2006»
14 years 2 months ago
Hierarchical Home Agent Architecture for Mobile IP Communications
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node us...
Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelma...
ISQED
2006
IEEE
259views Hardware» more  ISQED 2006»
14 years 2 months ago
Impact of NBTI on SRAM Read Stability and Design for Reliability
— Negative Bias Temperature Instability (NBTI) has the potential to become one of the main show-stoppers of circuit reliability in nanometer scale devices due to its deleterious ...
Sanjay V. Kumar, Chris H. Kim, Sachin S. Sapatneka...
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 2 months ago
W3Bcrypt: Encryption as a Stylesheet
Abstract. While web-based communications (e.g., webmail or web chatrooms) are increasingly protected by transport-layer cryptographic mechanisms, such as the SSL/TLS protocol, ther...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ADHOCNOW
2006
Springer
14 years 2 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
ACMICEC
2006
ACM
157views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
Adaptive mechanism design: a metalearning approach
Auction mechanism design has traditionally been a largely analytic process, relying on assumptions such as fully rational bidders. In practice, however, bidders often exhibit unkn...
David Pardoe, Peter Stone, Maytal Saar-Tsechansky,...