Secure and energy-efficient interconnects for board-to-board communication
暂无分享,去创建一个
Frank H. P. Fitzek | Eduard A. Jorswieck | Wolfgang E. Nagel | Juan Antonio Cabrera Carrillo | Giang T. Nguyen | Thomas Ilsche | Tao Li | Bho Matthiesen | Silvia Santini | Mario Bielert | Elke Franz | Andrew Lonnstrom | Thorsten Strufe | Stefan Pfennig | Christian Scheunert
[1] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[2] Bin Liu,et al. GreenTE: Power-aware traffic engineering , 2010, The 18th IEEE International Conference on Network Protocols.
[3] Fernando Pedone,et al. Merlin: A Language for Provisioning Network Resources , 2014, CoNEXT.
[4] Kwan-Wu Chin,et al. Energy-aware traffic engineering with reliability constraint , 2015, Comput. Commun..
[5] Wolfgang Lehner. Pathways to servers of the future , 2012 .
[6] Sebti Foufou,et al. Towards bandwidth guaranteed energy efficient data center networking , 2015, Journal of Cloud Computing.
[7] Wolfgang E. Nagel,et al. Simulation models verification for resilient communication on a highly adaptive energy-efficient computer , 2016, SpringSim.
[8] Anne Wolf,et al. End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models , 2016 .
[9] K. Jain,et al. Practical Network Coding , 2003 .
[10] Sabrina Engelmann,et al. Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks , 2017 .
[11] Eduard A. Jorswieck,et al. Global sum rate optimal resource allocation for non-regenerative 3-way relay channels , 2017, 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB).
[12] João Barros,et al. Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.
[13] Xuemin Shen,et al. P-Coding: Secure Network Coding against Eavesdropping Attacks , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Daniel Enrique Lucani,et al. On network coded distributed storage: How to repair in a fog of unreliable peers , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).
[15] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[16] Silvia Santini,et al. Energy-Aware Coflow and Antenna Scheduling for Hybrid Server-Centric Data Center Networks , 2019, IEEE Transactions on Green Communications and Networking.
[17] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[18] Christian Engelmann,et al. xSim: The extreme-scale simulator , 2011, 2011 International Conference on High Performance Computing & Simulation.
[19] Matthias S. Müller,et al. The Vampir Performance Analysis Tool-Set , 2008, Parallel Tools Workshop.
[20] Eduard A. Jorswieck,et al. Resource Allocation for Energy-Efficient 3-Way Relay Channels , 2014, IEEE Transactions on Wireless Communications.
[21] Thierry Turletti,et al. A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.
[22] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[23] Eduard A. Jorswieck,et al. Instantaneous relaying for the 3-way relay channel with circular message exchanges , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[24] Alexandros G. Dimakis,et al. Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[25] Ami Marowka,et al. Back to Thin-Core Massively Parallel Processors , 2011, Computer.
[26] Aydin Sezgin,et al. Multi-way Communications: An Information Theoretic Perspective , 2015, Found. Trends Commun. Inf. Theory.
[27] Eduard A. Jorswieck,et al. Energy Efficiency in MIMO Underlay and Overlay Device-to-Device Communications and Cognitive Radio Systems , 2015, IEEE Transactions on Signal Processing.
[28] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[29] Baochun Li,et al. How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.
[30] Wolfgang E. Nagel,et al. Modeling communication delays for network coding and routing for error-prone transmission , 2014, Third International Conference on Future Generation Communication Technologies (FGCT 2014).
[31] Wolfgang E. Nagel,et al. HAEC-SIM: a simulation framework for highly adaptive energy-efficient computing platforms , 2015, SimuTools.
[32] Eduard A. Jorswieck,et al. Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.
[33] Michael Wagner,et al. Open Trace Format 2: The Next Generation of Scalable Trace Formats and Support Libraries , 2011, PARCO.
[34] Dirk Schmidl,et al. Score-P: A Joint Performance Measurement Run-Time Infrastructure for Periscope, Scalasca, TAU, and Vampir , 2011, Parallel Tools Workshop.
[35] Eduard A. Jorswieck,et al. Robust secure goodput for massive MIMO and optical fiber wiretap channels , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[36] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[37] Jesús Labarta,et al. Analyzing Scheduling Policies Using Dimemas , 1997, Parallel Comput..
[38] Morten Videbæk Pedersen,et al. Network Coding Parallelization Based on Matrix Operations for Multicore Architectures , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[39] Elke Franz,et al. eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[40] Laxmikant V. Kalé,et al. Simulation-Based Performance Analysis and Tuning for a Two-Level Directly Connected System , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[41] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .