Sciweavers

3679 search results - page 690 / 736
» Virtual Networks on Demand
Sort
View
GLOBECOM
2007
IEEE
13 years 11 months ago
Amplify-and-Forward Capacity with Transmit Beamforming for MIMO Multiple-Relay Channels
In this paper, we consider a MIMO wireless relay network where communication between a source and a destination node is assisted by multiple relay nodes using the Amplifyand-Forwar...
Erhan Yilmaz, M. Oguz Sunay
HOTOS
2007
IEEE
13 years 11 months ago
Hyperspaces for Object Clustering and Approximate Matching in Peer-to-Peer Overlays
Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
Bernard Wong, Ymir Vigfusson, Emin Gün Sirer
ICCCN
2007
IEEE
13 years 11 months ago
Fair Efficiency, or Low Average Delay without Starvation
Abstract-- Elastic applications are primarily interested in minimal delay achievable for their messages under current network load. In this paper, we investigate how to transmit su...
Sergey Gorinsky, Christoph Jechlitschek
AICT
2006
IEEE
123views Communications» more  AICT 2006»
13 years 11 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer