Sciweavers

6122 search results - page 1108 / 1225
» Securing network access in wireless sensor networks
Sort
View
WIOPT
2006
IEEE
15 years 4 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
IWCMC
2006
ACM
15 years 3 months ago
Effective channel assignment in multi-hop W-CDMA cellular networks
Multi-hop relaying is an important concept in tackling the inherent problems of limited capacity and coverage in cellular networks. It helps to solve the dead-spots problem and to...
Yik Hung Tam, Hossam S. Hassanein, Selim G. Akl
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
14 years 10 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
TSP
2008
149views more  TSP 2008»
14 years 9 months ago
Decentralized Quantized Kalman Filtering With Scalable Communication Cost
Estimation and tracking of generally nonstationary Markov processes is of paramount importance for applications such as localization and navigation. In this context, ad hoc wireles...
Eric J. Msechu, Stergios I. Roumeliotis, Alejandro...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 3 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
« Prev « First page 1108 / 1225 Last » Next »