Sciweavers

2309 search results - page 322 / 462
» Patterns for Technology Companies
Sort
View
IH
2004
Springer
15 years 10 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
ISCC
2003
IEEE
15 years 10 months ago
Optimizing the implementation of a MANET routing protocol in a heterogeneous environment
This paper focuses on the implementation of heterogeneous Mobile Ad Hoc networks (MANET). A heterogeneous MANET is a wireless network setting without a fixed infrastructure where...
Carlos Miguel Tavares Calafate, Roman Garcia Garci...
ISWC
2003
IEEE
15 years 10 months ago
RF Free Ultrasonic Positioning
All wearable centric location sensing technologies must address the issue of clock synchronisation between signal transmitting systems and signal receiving systems. GPS receivers,...
Michael R. McCarthy, Henk L. Muller
121
Voted
DATE
2010
IEEE
162views Hardware» more  DATE 2010»
15 years 10 months ago
Error resilience of intra-die and inter-die communication with 3D spidergon STNoC
: Scaling down in very deep submicron (VDSM) technologies increases the delay, power consumption of on-chip interconnects, while the reliability and yield decrease. In high perform...
Vladimir Pasca, Lorena Anghel, Claudia Rusu, Ricca...
ESWS
2010
Springer
15 years 9 months ago
Put in Your Postcode, Out Comes the Data: A Case Study
A single datum or a set of a categorical data has little value on its own. Combinations of disparate sets of data increase the value of those data sets and helps to discover intere...
Tope Omitola, Christos L. Koumenides, Igor O. Popo...