Sciweavers

726 search results - page 63 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
SAINT
2009
IEEE
14 years 2 months ago
On Enhancing Event-to-Sink Data Delivery Throughput in Sensor Networks
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Md. Abdur Razzaque, Choong Seon Hong, Jin-Woong Ch...
ICC
2008
IEEE
145views Communications» more  ICC 2008»
14 years 2 months ago
A Collision-Free MAC Scheme for Multimedia Wireless Mesh Backbone
— In this paper, a novel collision-free MAC scheme supporting multimedia applications is proposed for wireless mesh backbone. The proposed scheme is distributed, simple, and scal...
Ping Wang, Weihua Zhuang
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
14 years 2 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary
TPDS
2008
115views more  TPDS 2008»
13 years 7 months ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung
COMCOM
2008
100views more  COMCOM 2008»
13 years 7 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib