Sciweavers

1992 search results - page 119 / 399
» On the (limited) power of non-equivocation
Sort
View
IWNAS
2008
IEEE
15 years 8 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
PIMRC
2008
IEEE
15 years 8 months ago
Decision feedback equalization in SC-FDMA
Abstract-SC-FDMA (Single-Carrier Frequency Division Multiple Access) is employed in tbe 3GPP LTE (Long-Term Evolution) standard as tbe uplink transmission scbeme. Tbe SC-FDMA signa...
Gillian Huang, Andrew R. Nix, Simon Armour
ICC
2007
IEEE
200views Communications» more  ICC 2007»
15 years 8 months ago
Channel Capacity of IM/DD Optical Communication Systems and of ACO-OFDM
In this paper we investigate the channel capacity of intensity modulated direct detection (IM/DD) wireless optical communication systems for an AWGN channel with a limit on the ave...
Xia Li, Rosemary Mardlin, Jean Armstrong
133
Voted
LICS
2007
IEEE
15 years 8 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
IWSOS
2007
Springer
15 years 8 months ago
The Development of a Wireless Sensor Network Sensing Node Utilising Adaptive Self-diagnostics
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...