Sciweavers

5325 search results - page 1041 / 1065
» Effective Computation for Nonlinear Systems
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
MOBISYS
2006
ACM
14 years 9 months ago
Fast handoff for seamless wireless mesh networks
This paper presents the architecture and protocols of SMesh, a completely transparent wireless mesh system that offers seamless, fast handoff, supporting VoIP and other real-time ...
Yair Amir, Claudiu Danilov, Michael Hilsdale, Ralu...
MOBIHOC
2008
ACM
14 years 9 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
MOBIHOC
2003
ACM
14 years 9 months ago
Energy-efficient caching strategies in ad hoc wireless networks
In this paper, we address the problem of energy-conscious cache placement in wireless ad hoc networks. We consider a network comprising a server with an interface to the wired net...
Pavan Nuggehalli, Vikram Srinivasan, Carla-Fabiana...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 6 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
« Prev « First page 1041 / 1065 Last » Next »