Sciweavers

5815 search results - page 1033 / 1163
» Self-monitoring for sensor networks
Sort
View
78
Voted
WSC
1997
15 years 2 months ago
Simulation and Control of Reactive Systems
We introduce SIDE (the acronym stands for Sensors In a Distributed Environment)—a software package for developing control programs for reactive systems. One distinctive feature ...
Pawel Gburzynski, Jacek Maitan
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
15 years 1 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
86
Voted
ICASSP
2010
IEEE
15 years 29 days ago
Quantization and compensation in sampled interleaved multi-channel systems
This paper considers the environment of interleaved, multi-channel measurements as arises for example in time-interleaved A/D converters and in distributed sensor networks. Such s...
Shay Maymon, Alan V. Oppenheim
73
Voted
CORR
2010
Springer
74views Education» more  CORR 2010»
15 years 26 days ago
Conflict-Free Coloring and its Applications
Let H = (V, E) be a hypergraph. A conflict-free coloring of H is an assignment of colors to V such that in each hyperedge e E there is at least one uniquely-colored vertex. This ...
Shakhar Smorodinsky
101
Voted
WS
2006
ACM
15 years 6 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
« Prev « First page 1033 / 1163 Last » Next »