Sciweavers

2945 search results - page 571 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ECRTS
2010
IEEE
15 years 24 days ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
CONEXT
2009
ACM
15 years 24 days ago
EZ-Flow: removing turbulence in IEEE 802.11 wireless mesh networks without message passing
Recent analytical and experimental work demonstrate that IEEE 802.11-based wireless mesh networks are prone to turbulence. Manifestations of such turbulence take the form of large...
Adel Aziz, David Starobinski, Patrick Thiran, Alae...
DAC
2010
ACM
14 years 12 months ago
Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis
Leveraging the power of nowadays graphics processing units for robust power grid simulation remains a challenging task. Existing preconditioned iterative methods that require inco...
Zhuo Feng, Zhiyu Zeng
MOBICOM
2010
ACM
14 years 12 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
MOBICOM
2010
ACM
14 years 12 months ago
Fair WLAN backhaul aggregation
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...