Sciweavers

173 search results - page 25 / 35
» Exploiting the Capabilities of Communications Co-Processors
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 8 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
CODES
2008
IEEE
14 years 1 months ago
Asynchronous transient resilient links for NoC
This paper proposes a new link for asynchronous NoC communications that is resilient to transient faults on the wires of the link without impact on the data transfer capability. R...
Simon Ogg, Bashir M. Al-Hashimi, Alexandre Yakovle...
GLOBECOM
2007
IEEE
14 years 1 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...
VTC
2007
IEEE
101views Communications» more  VTC 2007»
14 years 1 months ago
Soft Decoding Assisted Interference Cancellation in a Non-Binary LDPC Coded Fast Frequency Hopping Multiuser System Using Produc
— In this contribution, soft-input-soft-output (SISO) decoding aided successive interference cancellation (SIC) is considered in fast frequency hopping (FFH), M-ary frequency shi...
Sohail Ahmed, Lie-Liang Yang, Lajos Hanzo, Feng Gu...
ACSAC
2006
IEEE
14 years 1 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz