Sciweavers

2880 search results - page 453 / 576
» Using Channels for Multimedia Communication
Sort
View
SIGCOMM
1995
ACM
15 years 1 months ago
Performance Analysis of MD5
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...
Joseph D. Touch
TAPSOFT
1995
Springer
15 years 1 months ago
Static and Dynamic Processor Allocation for Higher-Order Concurrent Languages
Starting from the process algebra for Concurrent ML we develop two program analyses that facilitate the intelligent placement of processes on processors. Both analyses are obtaine...
Hanne Riis Nielson, Flemming Nielson
GLOBECOM
2007
IEEE
14 years 11 months ago
A SAGE Algorithm for Estimation of the Direction Power Spectrum of Individual Path Components
—In this contribution, the Fisher-Bingham-5 (FB5) probability density function (pdf) is used to model the shape of the direction power spectral density function (psdf) of individ...
Xuefeng Yin, Lingfeng Liu, Daniel K. Nielsen, Troe...
WISEC
2010
ACM
14 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
CORR
2006
Springer
121views Education» more  CORR 2006»
14 years 10 months ago
On Performance of Event-to-Sink Transport in Transmit-Only Sensor Networks
We consider a hybrid wireless sensor network with regular and transmit-only sensors. The transmit-only sensors do not have receiver circuit, hence are cheaper and less energy consu...
Bartlomiej Blaszczyszyn, Bozidar Radunovic