Sciweavers

5054 search results - page 965 / 1011
» simulation 2008
Sort
View
MOBIHOC
2008
ACM
14 years 9 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
MOBIHOC
2008
ACM
14 years 9 months ago
Rendezvous design algorithms for wireless sensor networks with a mobile base station
Recent research shows that significant energy saving can be achieved in wireless sensor networks with a mobile base station that collects data from sensor nodes via short-range co...
Guoliang Xing, Tian Wang, Weijia Jia, Minming Li
EUROSYS
2008
ACM
14 years 7 months ago
Modeling viral economies for digital media
Financial efficiency is the premier performance measure for most systems. Existing economic ecosystems for distribution of multimedia leave a lot to be desired: client-server plat...
Shan He, Renan G. Cattelan, Darko Kirovski
ICCD
2008
IEEE
165views Hardware» more  ICCD 2008»
14 years 7 months ago
Analysis and minimization of practical energy in 45nm subthreshold logic circuits
Abstract— Over the last decade, the design of ultra-lowpower digital circuits in subthreshold regime has been driven by the quest for minimum energy per operation. In this contri...
David Bol, Renaud Ambroise, Denis Flandre, Jean-Di...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 7 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...