Sciweavers

788 search results - page 39 / 158
» Physics of the shannon limits
Sort
View
ICDCS
2010
IEEE
14 years 11 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li
TON
2012
13 years 5 days ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
TMC
2012
13 years 4 days ago
The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks
—We present the boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without using infrastructure ...
Tingting Sun, Bin Zan, Yanyong Zhang, Marco Grutes...
CHI
2002
ACM
15 years 10 months ago
A flexible 3d sound system for interactive applications
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
Lalya Gaye
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 1 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...