Sciweavers

820 search results - page 117 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
142
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Contrabass: Concurrent transmissions without coordination for ad hoc networks
—A practical protocol jointly considering PHY and MAC for MIMO based concurrent transmissions in wireless ad hoc networks, called Contrabass, is presented. Concurrent transmissio...
Sungro Yoon, Injong Rhee, Bang Chul Jung, Babak Da...
88
Voted
ITCC
2005
IEEE
15 years 6 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
118
Voted
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 4 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
107
Voted
ICDCS
2010
IEEE
15 years 2 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li
116
Voted
MSWIM
2005
ACM
15 years 6 months ago
Performance analysis of the intertwined effects between network layers for 802.11g transmissions
While the canonical behavior of today’s home Internet users involves several residents concurrently executing diverse Internet applications, the most common home configuration ...
Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant...