The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As research on developing assertion languages for the AMS domain gains in momentum, it is increasingly being felt that extensions of existing assertion languages like PSL and SVA into the AMS domain are not adequate for expressing the analog design intent. This is largely due to the intricacy of the analog behavioral intent which cannot be captured purely in terms of logic. In this paper we show that...
Distributed computing plays a pivotal role in the advancement of technology and service. It shares all resources that are distributed over various nodes of a network, which makes effective computing easier and smarter. But this has also raised some problems in consistency of objects stored at various nodes in the network. These problems can be sorted out by using various protocols that are specifically...
Group membership protocols in distributed systems enable entities in a group to be aware of all other entities in the group. This information is essential for the system to perform as a cohesive unit collaborating to achieve a common objective. In dynamic environments where devices join and leave the group frequently and failures occur, maintaining consistent group membership information efficiently...
Both symmetric and asymmetric key algorithms are used to secure a network. Asymmetric key approach involves greater time complexity and hence prone to higher power consumption. Symmetric key cryptography, on the other hand, involves a key exchange phase. In this paper, we propose an authentication technique for new nodes to an ad-hoc network that would also extract the advantages of both symmetric...
In this paper we study two-hop cooperative diversity relaying in random wireless networks. In contrast to most work on cooperative diversity relaying where the relay node positions or average channel characteristics are given as parameters, we formulate the problem recognizing that node positions, as well as channel fading states of the channels among the nodes, are random. We propose a simple protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.