Sciweavers

1965 search results - page 182 / 393
» Layered Design Visualisation
Sort
View
CCS
2009
ACM
15 years 9 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 9 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 9 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
DATE
2007
IEEE
134views Hardware» more  DATE 2007»
15 years 9 months ago
Accurate temperature-dependent integrated circuit leakage power estimation is easy
— It has been the conventional assumption that, due to the superlinear dependence of leakage power consumption on temperature, and widely varying on-chip temperature profiles, a...
Yongpan Liu, Robert P. Dick, Li Shang, Huazhong Ya...
INFOCOM
2007
IEEE
15 years 9 months ago
Statistical Multiplexing Over DSL Networks
— Most previous work in statistical multiplexing only considered the case where the link transmission rates are fixed. In this paper, we consider statistical multiplexing in net...
Jianwei Huang, Chee-Wei Tan, Mung Chiang, Raphael ...