Sciweavers

182 search results - page 30 / 37
» Turing's Analysis of Computation and Theories of Cognitive A...
Sort
View
MOBIHOC
2001
ACM
14 years 7 months ago
Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices
This paper presents 7DS, a novel peer-to-peer data sharing system. 7DS is an architecture, a set of protocols and an implementation enabling the exchange of data among peers that ...
Maria Papadopouli, Henning Schulzrinne
SIGCOMM
2009
ACM
14 years 1 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
MOBICOM
2006
ACM
14 years 1 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 18 days ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
CASES
2006
ACM
14 years 1 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson