Sciweavers

1380 search results - page 203 / 276
» scheduling 2008
Sort
View
136
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
—We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the comple...
Frederic Stumpf, Claudia Eckert
124
Voted
VTC
2008
IEEE
186views Communications» more  VTC 2008»
15 years 10 months ago
Combination of Dynamic-TDD and Static-TDD Based on Adaptive Power Control
— To support dynamic traffic-asymmetry property in future wireless communication systems, we propose a hybridTDD scheme, combination of static-TDD and dynamic-TDD. By using adap...
Howon Lee, Dong-Ho Cho
VTC
2008
IEEE
157views Communications» more  VTC 2008»
15 years 10 months ago
Performance of MIMO Aware RRM in Downlink OFDMA
— This paper addresses advanced radio resource management (RRM) algorithms for multiple-input multipleoutput (MIMO) transmission schemes in downlink OFDMA systems. The analysis c...
István Z. Kovács, Markku Kuusela, El...
89
Voted
VTC
2008
IEEE
111views Communications» more  VTC 2008»
15 years 10 months ago
WiMAX Capacity Estimations and Simulation Results
—In this paper, we propose some considerations for the WiMAX capacity. The developments realized for a WiMAX NS-2 module are presented. This module allows the evaluation of the W...
Aymen Belghith, Loutfi Nuaymi
140
Voted
ACISP
2008
Springer
15 years 10 months ago
Looking Back at a New Hash Function
Abstract. We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explor...
Olivier Billet, Matthew J. B. Robshaw, Yannick Seu...