Flexible, micro-coded accelerators are applied to perform physical layer processing in communications applications. The accelerators are reconfigurable and may be programmed to incorporate new protocols as they are introduced.
Web www.patentalert.com
> Preventing network data injection attacks using duplicate-ACK and reassembly gap approaches
HOME | NEW USER | LOGIN | SUBSCRIPTIONS | SEARCH | GUESTBOOK | CONTACT