An Introduction to Reconfigurable Computing. What is RC? RC Architectures. How did RC originate? Inside the FPGA. Mapping Algorithms to Hardware. RC Applications. Example: Dot Product. Further Reading -- Reconfigurable Logic Devices. Field-Programmable Gate Arrays. Coarse-Grained Reconfigurable Arrays. Summary -- Reconfigurable Computing Systems. Parallel Processing on Reconfigurable Computers.…
Optimal Controls on Finite and Infinite Horizons: A Review -- State Feedback Receding Horizon Controls -- Receding Horizon Filters -- Output Feedback Receding Horizon Controls -- Constrained Receding Horizon Controls -- Nonlinear Receding Horizon Controls.Receding Horizon Control introduces the essentials of a successful feedback strategy that has emerged in many industrial fields: the process …
Security Protocol Design -- Challenges in Protocol Design and Analysis -- Private Matching -- Authentication Protocol Analysis -- Self-Certified Approach for Authenticated Key Agreement -- P2P and Ad Hoc Networks -- Experimenting with Admission Control in P2P Networks -- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- Intrusion Detection, Defense, Measurement -- Measuri…
Keynote Speech -- Session 1: Sensor Networks I -- Session 2: 3G/B3G Networks -- Session 3: Peer-to-Peer Systems -- Session 4: Caching and Routing -- Session 5: Wireless Networks -- Session 6: Multicast I -- Session 7: Ad Hoc Networks I -- Session 8: Algorithms I -- Session 9: Security I -- Session 10: Peer-to-Peer Systems and Web Service -- Session 11: Multicast II -- Session 12: Traffic and Ne…
Peer-to-Peer Networks -- Performance of Internet Protocols I -- Wireless Security -- Network Security -- Wireless Performance -- Network Service Support -- Network Modeling and Simulations -- Wireless LANs -- Optical Networking -- Performance of Internet & Web Applications -- Ad Hoc Networks I -- Adaptive Networking -- Performance of Internet Protocols II -- Radio Resource Management -- Interne…
GRID -- Optical Networks (I) -- Wireless Networks (I) -- QoS (I) -- Optical Networks (II) -- Wireless Networks (II) -- QoS (II) -- Optical Networks (III) -- Wireless Networks (III) -- WPAN -- Sensor Networks (I) -- Traffic Control (I) -- Communication Architectures -- Sensor Networks (II) -- Traffic Control (II) -- Audio and Video Communications -- Sensor Networks (III) -- Traffic Control (III)…
Network Policy -- Configuration Model for Network Management -- On-Line Control of Service Level Agreements -- Revenue-Aware Resource Allocation in the Future Multi-Service IP Networks -- Network Security -- A Kerberos-Based Authentication Architecture for WLANS -- An Efficient Mechanism to Ensure Location Privacy in Telecom Service Applications -- Network Security Management: A Formal Evaluati…
Introduction: Digital Revolution - Mobile Revolution? -- Mobile Telephony: Realising the Dream of Ideal Communication? -- History Repeating? A Comparison of the Launch and Uses of Fixed and Mobile Phones -- Kids will be Kids: The Role of Mobiles in Teenage Life -- An SMS History -- Emotional Attachment to Mobile Phones: An Extraordinary Relationship -- Textmates and Text Circles: Insights into …
Research Questions for the Evolving Communications Landscape -- Mobile Back to Front: Uncertainty and Danger in the Theory—Technology Relation -- Wi-Fi Networks and the Reorganization of Wireline—Wireless Relationship -- Mobile Phones as Fashion Statements: The Co-creation of Mobile Communication’s Public Meaning -- Behavioral Changes at the Mobile Workplace: A Symbolic Interactionistic A…
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks -- Cross-Layer Simulation and Optimization for Mobile Ad-Hoc Networks -- Improving TCP Performance over Wireless Networks Using Loss Differentiation Algorithms -- TCP Performances in a Hybrid Broadcast/Telecommunication System -- Handoff Notification in Wireless Hybrid Networks -- Selective Activ…