Sciweavers

5123 search results - page 58 / 1025
» Performance and Security Tradeoff
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
ICDCSW
2009
IEEE
15 years 4 months ago
EDLA Tradeoffs for Wireless Sensor Network Target Tracking
—The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network’s data. As node hibernation techniq...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
67
Voted
ATAL
2009
Springer
15 years 4 months ago
Analyzing the tradeoffs between breakup and cloning in the context of organizational self-design
Organizational Self-Design (OSD) has been proposed as an approach to constructing suitable organizations at runtime in which the agents are responsible for constructing their own ...
Sachin Kamboj
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 4 months ago
Finite Queuing Model Analysis for Energy and QoS Tradeoff in Contention-Based Wireless Sensor Networks
In contention-based sensor networks, nodes compete to access a shared channel for data transmission and collision is a common challenge. For power conservation, periodical active/s...
Jun Luo, Ling-ge Jiang, Chen He
IPPS
2007
IEEE
15 years 4 months ago
Pipelining Tradeoffs of Massively Parallel SuperCISC Hardware Functions
Parallel processing using multiple processors is a well-established technique to accelerate many different classes of applications. However, as the density of chips increases, ano...
Colin J. Ihrig, Justin Stander, Alex K. Jones