Sciweavers

161 search results - page 27 / 33
» An Analysis of Delay Based PUF Implementations on FPGA
Sort
View
NDSS
2009
IEEE
15 years 6 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
DATE
2007
IEEE
104views Hardware» more  DATE 2007»
15 years 6 months ago
Dynamic reconfiguration in sensor networks with regenerative energy sources
In highly power constrained sensor networks, harvesting energy from the environment makes prolonged or even perpetual execution feasible. In such energy harvesting systems, energy...
Ani Nahapetian, Paolo Lombardo, Andrea Acquaviva, ...
88
Voted
OSDI
2004
ACM
15 years 12 months ago
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...
David P. Olshefski, Jason Nieh, Erich M. Nahum
ICDCS
2008
IEEE
15 years 6 months ago
Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks
Low power radios, such as the CC2420, have been widely popular with recent sensor platforms. This paper explores the potential for energy savings from adding a highpower, high-ban...
Cigdem Sengul, Mehedi Bakht, Albert F. Harris III,...
96
Voted
IOLTS
2003
IEEE
133views Hardware» more  IOLTS 2003»
15 years 5 months ago
Power Consumption of Fault Tolerant Codes: the Active Elements
On-chip global interconnections in very deep submicron technology (VDSM) ICs are becoming more sensitive and prone to errors caused by power supply noise, crosstalk noise, delay v...
Daniele Rossi, Steven V. E. S. van Dijk, Richard P...