Sciweavers

694 search results - page 36 / 139
» The Power of the Middle Bit
Sort
View
DSN
2006
IEEE
13 years 11 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman
JMM2
2006
140views more  JMM2 2006»
13 years 8 months ago
A Cost-Effective Peer-to-Peer Architecture for Large-Scale On-Demand Media Streaming
This paper presents a cost-effective peer-to-peer (P2P) architecture for large-scale on-demand media streaming, named BitVampire. BitVampire's primary design goal is to aggreg...
Xin Liu, Son T. Vuong
DATE
2006
IEEE
108views Hardware» more  DATE 2006»
14 years 2 months ago
Architectural and technology influence on the optimal total power consumption
In this paper, an approximated closed-form total power consumption equation for circuits working at their optimal supply and threshold voltage is presented. Comparisons of this fo...
Christian Schuster, Jean-Luc Nagel, Christian Pigu...
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 7 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
WCNC
2008
IEEE
14 years 2 months ago
Sidelobe Suppression for OFDM-Based Cognitive Radios Using Constellation Expansion
— In this paper, we present a novel algorithm for reducing sidelobe interference power levels in OFDM-based cognitive radios. Existing techniques for sidelobe suppression can be ...
Srikanth Pagadarai, Rakesh Rajbanshi, Alexander M....