Sciweavers

546 search results - page 87 / 110
» An Implementation Scheme of Relational Tables
Sort
View
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
13 years 8 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
TMC
2010
182views more  TMC 2010»
13 years 5 months ago
Rate Adaptation in Congested Wireless Networks through Real-Time Measurements
—Rate adaptation is a critical component that impacts the performance of IEEE 802.11 wireless networks. In congested networks, traditional rate adaptation algorithms have been sh...
Prashanth Aravinda Kumar Acharya, Ashish Sharma, E...
PERCOM
2011
ACM
12 years 10 months ago
A robust dead-reckoning pedestrian tracking system with low cost sensors
—The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian...
Yunye Jin, Hong-Song Toh, Wee-Seng Soh, Wai-Choong...
INFOCOM
2012
IEEE
11 years 10 months ago
Estimators also need shared values to grow together
—Network management applications require large numbers of counters in order to collect traffic characteristics for each network flow. However, these counters often barely fit ...
Erez Tsidon, Iddo Hanniel, Isaac Keslassy
EOR
2008
106views more  EOR 2008»
13 years 7 months ago
Convergent Lagrangian heuristics for nonlinear minimum cost network flows
We consider the separable nonlinear and strictly convex single-commodity network flow problem (SSCNFP). We develop a computational scheme for generating a primal feasible solution...
Torbjörn Larsson, Johan Marklund, Caroline Ol...