نتایج جستجو برای: mac method

تعداد نتایج: 1654775  

2015

This paper presents a merged multiplyaccumulate (MAC) hardware that is based on the modified Booth algorithm. The carry-save method is used in the Booth encoder, the Booth multiplier, and the accumulator sections to guarantee the fastest possible. By combining multiplication with accumulation and devising a hybrid type of carry save adder (CSA), the performance was improved. Also, the proposed ...

2006
Jianyong Huang Jennifer Seberry Willy Susilo

Abstract. ALPHA-MAC is a MAC function which uses the building blocks of AES. This paper studies the internal structure of this new design. First, we provide a method to find second preimages based on the assumption that a key or an intermediate value is known. The proposed searching algorithm exploits the algebraic properties of the underlying block cipher and needs to solve eight groups of lin...

2013
Son N. Le Yibo Zhu Jun-Hong Cui

Despite effort spent over past years, an efficient MAC protocol design is still a challenging issue in underwater acoustic networks (UANs) mostly due to two factors: first, the long propagation delay of the acoustic signal in underwater environment; and second, the high variability of the environment. In this paper, we introduce a new MAC protocol for string UANs called Pipelined Transmission M...

2015

This paper presents a merged multiplyaccumulate (MAC) hardware that is based on the modified Booth algorithm. The carry-save method is used in the Booth encoder, the Booth multiplier, and the accumulator sections to guarantee the fastest possible. By combining multiplication with accumulation and devising a hybrid type of carry save adder (CSA), the performance was improved. Also, the proposed ...

2007
Božidar Radunović Jean-Yves Le Boudec Raymond Knopp

We consider a wide-band ad-hoc network with coherent radios in a slow-fading environment, and we analyze the performance of different physical layer (PHY) and medium access (MAC) schemes in such a network. Most of the existing analysis assume that PHY is based on a nearest neighborhood decoding, which is not optimal in this case. Instead, we focus on MLE detector. We show that, since some of th...

2004
Tzu-Chieh Tsai Chien-Ming Tu

The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, when the IEEE 802.11 MAC is used in wireless ad hoc networks, it will suffer from more serious hidden terminal and exposed terminal problems than those in WLAN. More specifically, it is resulted from the “large” interference range and the “large“ carrier sensing range. In...

2011
S. Padmaja

we study joint end-to-end congestion control and Per-link medium access control (MAC) in ad-hoc networks. We use a network utility maximization formulation, where the goal is to find optimal end-to-end source rates at the transport layer and per-link persistence probabilities at the medium access control (MAC) layer to maximize the aggregate source utility. Under certain conditions, by applying...

2003
Jun Zhao Zihua Guo Qian Zhang Wenwu Zhu

In current WLAN system that is designed for best-effort communications, there is not any quality of service (QoS) differentiation support. In this paper, we propose a fully distributed medium access control (MAC) adaptation method for service differentiation. It is implemented by dynamically updating the MAC layer parameters (such as contention window) to adapt to the network conditions in a cl...

Journal: :JCM 2009
Lei Jiao Frank Y. Li

Parallel rendezvous multi-channel MAC mechanisms are regarded as an efficient method for media access control in cognitive radio networks since they do not need a control channel and use only one transceiver. However, existing parallel rendezvous MAC mechanisms assume that all channels have the same maximum capacity and channel availability for secondary users. In this paper, we propose a dynam...

Journal: :CoRR 2013
Yasutada Oohama

Abstract—In this paper we consider the identification (ID) via multiple access channels (MACs). In the general MAC the ID capacity region includes the ordinary transmission (TR) capacity region. In this paper we discuss the converse coding theorem. We estimate two types of error probabilities of identification for rates outside capacity region, deriving some function which serves as a lower bou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید