Sciweavers

10406 search results - page 2020 / 2082
» Using RDF to Model the Structure and Process of Systems
Sort
View
125
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
122
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks
— Link and node reliability are important metrics in wireless ad hoc networks. Therefore, evaluating and quantifying reliability has become the cornerstone of research in this ...
Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu
144
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Stability Emphasizing Cross-Layer Optimization of Transmit Power Allocation in Distributed Wireless Networks
Abstract— This paper theoretically analyzes cross-layer optimized design of transmit power allocation in distributed interference-limited wireless networks with asynchronously ac...
Stepán Kucera, Sonia Aïssa, Susumu Yos...
91
Voted
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
15 years 9 months ago
An Investigation and a Preventing Strategy for the Redundant Packets in P2P Networks with Push Method
The push method for data transmission in peer-to-peer system has drawn great interest, since it can efficiently reduce the accumulated latency observed at user nodes. However, it ...
Xin Xiao, Yuanchun Shi, Meng Zhang
« Prev « First page 2020 / 2082 Last » Next »