Sciweavers

788 search results - page 106 / 158
» Physics of the shannon limits
Sort
View
DSN
2004
IEEE
15 years 1 months ago
Impact of Path Diversity on Multi-homed and Overlay Networks
Multi-homed and overlay networks are two widely studied approaches aimed at leveraging the inherent redundancy of the Internet's underlying routing infrastructure to enhance ...
Junghee Han, Farnam Jahanian
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 1 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
DAGM
2006
Springer
15 years 1 months ago
Ultrasound Image Denoising by Spatially Varying Frequency Compounding
Ultrasound images are very noisy. Along with system noise, a significant noise source is the speckle phenomenon, caused by interference in the viewed object. Most past approaches f...
Yael Erez, Yoav Y. Schechner, Dan Adam
DAMON
2006
Springer
15 years 1 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
DCOSS
2006
Springer
15 years 1 months ago
Agimone: Middleware Support for Seamless Integration of Sensor and IP Networks
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like t...
Gregory Hackmann, Chien-Liang Fok, Gruia-Catalin R...