Sciweavers

388 search results - page 45 / 78
» Communication chains and multitasking
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 8 months ago
MIMO Transmission with Residual Transmit-RF Impairments
Abstract--Physical transceiver implementations for multipleinput multiple-output (MIMO) wireless communication systems suffer from transmit-RF (Tx-RF) impairments. In this paper, w...
Christoph Studer, Markus Wenk, Andreas Burg
SIGCOMM
2009
ACM
14 years 2 months ago
A hierarchical model for BGP routing policies
BGP routing policies are mainly used by network operators to enforce business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, ...
Laurent Vanbever, Bruno Quoitin, Olivier Bonaventu...
SIGCOMM
2009
ACM
14 years 2 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
MICRO
2005
IEEE
117views Hardware» more  MICRO 2005»
14 years 1 months ago
A Quantum Logic Array Microarchitecture: Scalable Quantum Data Movement and Computation
Recent experimental advances have demonstrated technologies capable of supporting scalable quantum computation. A critical next step is how to put those technologies together into...
Tzvetan S. Metodi, Darshan D. Thaker, Andrew W. Cr...
SASN
2005
ACM
14 years 1 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra