Sciweavers

1722 search results - page 157 / 345
» Dedication
Sort
View
CSE
2009
IEEE
15 years 10 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
126
Voted
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
15 years 10 months ago
Enabling concurrent clock and power gating in an industrial design flow
— Clock-gating and power-gating have proven to be very effective solutions for reducing dynamic and static power, respectively. The two techniques may be coupled in such a way th...
Leticia Maria Veiras Bolzani, Andrea Calimera, Alb...
133
Voted
DSD
2009
IEEE
105views Hardware» more  DSD 2009»
15 years 10 months ago
Design of a Highly Dependable Beamforming Chip
—As CMOS process technology advances towards 32nm, SoC complexity continuously grows but its dependability significantly decreases. In this paper, a beamforming chip 1 is designe...
Xiao Zhang, Hans G. Kerkhoff
124
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Hybrid Pilot/Quantization Based Feedback in Multi-Antenna TDD Systems
— The communication between a multiple-antenna transmitter and multiple receivers (users) with either a single or multiple-antenna each can be significantly enhanced by providin...
Umer Salim, David Gesbert, Dirk T. M. Slock, Zafer...
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 10 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi