Sciweavers

319 search results - page 28 / 64
» Design and analysis of an IEEE 802.16e-based OFDMA communica...
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 22 days ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
ICC
2007
IEEE
149views Communications» more  ICC 2007»
14 years 2 months ago
Synchronization Signal Design for OFDM Based On Time-Frequency Hopping Patterns
— In an OFDM system, channel estimation can be considered as sampling the time-frequency response of the channel through a number of known pilot symbols placed across the time-fr...
Jiann-Ching Guey
INFOCOM
2007
IEEE
14 years 1 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
DATE
2006
IEEE
91views Hardware» more  DATE 2006»
14 years 1 months ago
How OEMs and suppliers can face the network integration challenges
Systems integration is a major challenge in many industries. Systematic analysis of the complex integration effects, especially with respect to timing and performance, significant...
Kai Richter, Rolf Ernst