Sciweavers

490 search results - page 68 / 98
» Changing the Channel
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 2 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
SEUS
2007
IEEE
14 years 2 months ago
A QoS Routing Protocol for Mobile Ad Hoc Networks Based on a Reservation Pool
Even without possible interference from external radio sources, the problem of guaranteeing quality-of-service (QoS) routing in mobile ad hoc networks (MANETs) is a difficult probl...
Donghak Pyo, Sunggu Lee, Min-Gu Lee
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Handover Approach to DVB-H Services
DVB-H offers a new platform for IP-based services and contributes to universal access. There are many challenges of providing multimedia TV experience for DVB-H users anywhere any...
Ville Ollikainen, Chengyuan Peng
WICON
2008
13 years 9 months ago
A graph based routing algorithm for multi-hop cognitive radio networks
Cognitive radio networks that allow dynamic spectrum access are considered spectrally more efficient than networks using fixed spectral allocation. These networks are characterize...
Yogesh Reddy Kondareddy, Prathima Agrawal
NETCOOP
2009
Springer
14 years 2 months ago
User Association to Optimize Flow Level Performance in Wireless Systems with Dynamic Interference
We study the impact of user association policies on flow-level performance in interference limited wireless networks. Most research in this area has used static interference model...
Balaji Rengarajan, Gustavo de Veciana