Sciweavers

852 search results - page 60 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
CORR
2010
Springer
105views Education» more  CORR 2010»
14 years 11 months ago
Universal and Robust Distributed Network Codes
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented [1] over fi...
Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lin...
GLOBECOM
2009
IEEE
15 years 1 months ago
Energy-Efficient Space-Time Coded Cooperative Routing in Multihop Wireless Networks
Due to the limited energy supplies of nodes in many applications like wireless sensor networks, energy efficiency is crucial for extending the lifetime of these networks. This pape...
Behrouz Maham, Ravi Narasimhan, Are Hjørung...
145
Voted
MSR
2006
ACM
15 years 10 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
CF
2009
ACM
15 years 10 months ago
High-performance SIMT code generation in an active visual effects library
SIMT (Single-Instruction Multiple-Thread) is an emerging programming paradigm for high-performance computational accelerators, pioneered in current and next generation GPUs and hy...
Jay L. T. Cornwall, Lee W. Howes, Paul H. J. Kelly...
COMCOM
2011
14 years 11 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...