Sciweavers

5123 search results - page 72 / 1025
» Performance and Security Tradeoff
Sort
View
VTC
2006
IEEE
103views Communications» more  VTC 2006»
15 years 4 months ago
On the Golden Code Performance for MIMO-HSDPA System
Abstract— In this paper, we propose a new MIMO-HSDPA transmission scheme with two transmit and two receive antennas, using an optimal Space-Time block code: the Golden code [1]. ...
Rym Ouertani, Ahmed Saadani, Ghaya Rekaya-Ben Othm...
78
Voted
ARITH
2003
IEEE
15 years 3 months ago
Energy-Delay Estimation Technique for High-Performance Microprocessor VLSI Adders
In this paper, we motivate the concept of comparing VLSI adders based on their energy-delay trade-offs and present a technique for estimating the energy-delay space of various hig...
Vojin G. Oklobdzija, Bart R. Zeydel, Hoang Q. Dao,...
CCS
2007
ACM
15 years 4 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
ACSAC
2008
IEEE
15 years 4 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 3 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...