Sciweavers

832 search results - page 12 / 167
» Effect of Malicious Synchronization
Sort
View
ICNSC
2008
IEEE
14 years 4 months ago
Synchronization of a General Delayed Complex Dynamical Network via Adaptive Feedback
— Complex networks have attracted much attention from various fields of sciences and engineering over the last ten years. To reveal the dynamical mechanism of synchronization in...
Qunjiao Zhang, Junan Lu, Jinhu Lii
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 4 months ago
Synchronization in MB-OFDM-based UWB Systems
Abstract—This paper presents a preamble-based low complexity synchronization method for MB-OFDM based UWB systems. The proposed synchronization method consists of sync detection,...
Trent Jacobs, Yinghui Li, Hlaing Minn, R. M. A. P....
SIGCSE
2000
ACM
193views Education» more  SIGCSE 2000»
14 years 2 months ago
Experimentation with bounded buffer synchronization
Undergraduates are usually introduced to synchronization in operating systems through a discussion of classical problems such as reader-writer or producers-consumers. The traditio...
Steven Robbins
CIC
2006
124views Communications» more  CIC 2006»
13 years 11 months ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
WETICE
2005
IEEE
14 years 3 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong