Sciweavers

5493 search results - page 1069 / 1099
» Effectively Polynomial Simulations
Sort
View
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 7 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
CORR
2007
Springer
105views Education» more  CORR 2007»
13 years 7 months ago
Design and Modeling of a Mems-Based Valveless Pump Driven by an Electromagnetic Force
A novel valveless micro impedance pump is proposed and analyzed in this study. The pump is constructed of a upper glass plate, two glass tubes, a PDMS (polydimethylsilxane) diaphr...
Hsien-Tsung Chang, Chia-Yen Lee, Chih-Yung Wen
JSAC
2008
199views more  JSAC 2008»
13 years 7 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
JSAC
2008
161views more  JSAC 2008»
13 years 7 months ago
HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management
Abstract--Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the sp...
Juncheng Jia, Qian Zhang, Xuemin Shen
MICRO
2008
IEEE
146views Hardware» more  MICRO 2008»
13 years 7 months ago
A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags
Dynamically tracking the flow of data within a microprocessor creates many new opportunities to detect and track malicious or erroneous behavior, but these schemes all rely on the...
Mohit Tiwari, Banit Agrawal, Shashidhar Mysore, Jo...
« Prev « First page 1069 / 1099 Last » Next »