Sciweavers

6318 search results - page 5 / 1264
» Data Leakage Detection
Sort
View
HPCC
2009
Springer
15 years 2 months ago
A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor Network
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and t...
Yi-Ying Zhang, Xi Luo, Laurence Tianruo Yang, Lei ...
ICCAD
2003
IEEE
152views Hardware» more  ICCAD 2003»
15 years 6 months ago
Leakage Power Optimization Techniques for Ultra Deep Sub-Micron Multi-Level Caches
On-chip L1 and L2 caches represent a sizeable fraction of the total power consumption of microprocessors. In deep sub-micron technology, the subthreshold leakage power is becoming...
Nam Sung Kim, David Blaauw, Trevor N. Mudge
ICIP
2003
IEEE
15 years 11 months ago
Channel aware unequal error protection for image transmission over broadband wireless LAN
Orthogonal Frequency Division Multiplexing (OFDM) has been adopted in many broadband wireless communication standards. In OFDM systems, channel estimation is a crucial module in co...
Charles Pandana, Yan Sun, K. J. Ray Liu
GLOBECOM
2010
IEEE
14 years 7 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
59
Voted
ISLPED
2005
ACM
68views Hardware» more  ISLPED 2005»
15 years 3 months ago
Low power SRAM techniques for handheld products
SRAM leakage constitutes a significant portion of the standby power budget of modern SoC products for handheld applications such as PDA and cellular phones. NMOS and PMOS reverse ...
Rabiul Islam, Adam Brand, Dave Lippincott