Sciweavers

960 search results - page 171 / 192
» Distributed Antenna Systems with Randomness
Sort
View
IFIPTM
2009
109views Management» more  IFIPTM 2009»
13 years 5 months ago
Elimination of Subjectivity from Trust Recommendation
In many distributed applications, a party who wishes to make a transaction requires that it has a certain level of trust in the other party. It is frequently the case that the part...
Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elis...
TWC
2011
367views more  TWC 2011»
13 years 2 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien
TSP
2010
13 years 2 months ago
On the optimal performance in asymmetric gaussian wireless sensor networks with fading
We study the estimation of a Gaussian source by a Gaussian wireless sensor network (WSN) where L distributed sensors transmit noisy observations of the source through a fading Gau...
Hamid Behroozi, Fady Alajaji, Tamás Linder
VLSI
2010
Springer
13 years 2 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
HPCA
2009
IEEE
14 years 8 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...