Sciweavers

103 search results - page 9 / 21
» An Empirical Study of the Potential for Context-Aware Power ...
Sort
View
IJNSEC
2008
119views more  IJNSEC 2008»
13 years 7 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
WICOMM
2002
85views more  WICOMM 2002»
13 years 7 months ago
Throughput and energy performance of TCP on a wideband CDMA air interface
In this paper, we present a study on the performance of TCP, in terms of both throughput and energy consumption, in the presence of a Wideband CDMA radio interface typical of thir...
Michele Zorzi, Michele Rossi, Gianluca Mazzini
IPPS
2009
IEEE
14 years 2 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
HPDC
2002
IEEE
14 years 9 days ago
Distributed Computing with Load-Managed Active Storage
One approach to high-performance processing of massive data sets is to incorporate computation into storage systems. Previous work has shown that this active storage model is effe...
Rajiv Wickremesinghe, Jeffrey S. Chase, Jeffrey Sc...
TMA
2012
Springer
254views Management» more  TMA 2012»
12 years 2 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...