Sciweavers

529 search results - page 60 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
DAC
2003
ACM
15 years 7 months ago
Advanced techniques for RTL debugging
Conventional register transfer level (RTL) debugging is based on overlaying simulation results on structural connectivity information of the Hardware Description Language (HDL) so...
Yu-Chin Hsu, Bassam Tabbara, Yirng-An Chen, Fur-Sh...
IWCMC
2010
ACM
15 years 3 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
SASN
2005
ACM
15 years 7 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
GI
2001
Springer
15 years 6 months ago
Ontology-based Access to heterogeneous XML Data
: With the increase in popularity of XML on the Internet, the requirements of database management systems have shifted from traditional transaction-based databases towards the kind...
Lule Ahmedi, Pedro José Marrón, Geor...
SENSYS
2009
ACM
15 years 8 months ago
Explicit and precise rate control for wireless sensor networks
The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive inc...
Avinash Sridharan, Bhaskar Krishnamachari