Sciweavers

97 search results - page 7 / 20
» IP covert timing channels: design and detection
Sort
View
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 7 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
VTC
2007
IEEE
148views Communications» more  VTC 2007»
14 years 1 months ago
Iteratively Detected Irregular Variable Length Coding and Sphere-Packing Modulation-Aided Differential Space-Time Spreading
Abstract— In this paper we consider serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Differential Space-Time Spreadin...
Mohammed El-Hajjar, Robert G. Maunder, Osamah Alam...
COMSWARE
2006
IEEE
13 years 11 months ago
VoIP service quality monitoring using active and passive probes
Service providers and enterprises all over the world are rapidly deploying Voice over IP (VoIP) networks because of reduced capital and operational expenditure, and easy creation o...
Shipra Agrawal, P. P. S. Narayan, Jeyashankher Ram...
VTC
2008
IEEE
139views Communications» more  VTC 2008»
14 years 1 months ago
Downlink Steered Space-Time Spreading For Multi-Carrier Transmission Over Frequency Selective Channels
— This paper presents a novel amalgam of Steered Space-Time Spreading (SSTS) and Orthogonal Frequency Division Multiple Access (OFDMA) designed for attaining both spatial diversi...
Nazar Sahal, Mohammed El-Hajjar, Lajos Hanzo
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 9 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...