Sciweavers

1066 search results - page 93 / 214
» A Wearable Communication Modulator
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
GLOBECOM
2007
IEEE
14 years 2 months ago
Analyzing Performance of Multi-User Scheduling Jointly with AMC and ARQ
—This paper deals with the analytical evaluation of the average delay, the packet-loss rate (PLR) and the throughput of a multi-user (MU) wireless system that capitalizes on a cr...
Mario Poggioni, Luca Rugini, Paolo Banelli
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 2 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
VTC
2007
IEEE
142views Communications» more  VTC 2007»
14 years 2 months ago
Iterative Demodulation and Decoding for Rotated MPSK Constellations with Convolutional Coding and Signal Space Diversity
— Signal space diversity (SSD) with the rotation of the signal constellation using multi-level modulation schemes is known to provide good performance gains over fading channels....
Nauman F. Kiyani, Jos H. Weber
VTC
2007
IEEE
106views Communications» more  VTC 2007»
14 years 2 months ago
The BICM Capacity of Coherent Continuous-Phase Frequency Shift Keying
Abstract— This paper presents a methodology for determining the capacity of coherently detected continuousphase frequency shift keying (CPFSK) modulation under the constraints of...
Rohit Iyer Seshadri, Shi Cheng, Matthew C. Valenti