Sciweavers

270 search results - page 22 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
AHSWN
2010
102views more  AHSWN 2010»
13 years 7 months ago
A Framework for the Capacity Evaluation of Multihop Wireless Networks?
The specific challenges of multihop wireles networks lead to a strong research effort on efficient protocols design where the offered capacity is a key objective. More specifically...
Hervé Rivano, Fabrice Theoleyre, Fabrice Va...
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
GLOBECOM
2009
IEEE
14 years 2 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...
ITNG
2007
IEEE
14 years 1 months ago
Performance Analysis of Error Control Codes for Wireless Sensor Networks
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary t...
Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yo...
WSC
2008
13 years 9 months ago
Managing WIP and cycle time with the help of Loop Control
As an adaptation of the CONWIP concept, AMD has developed a heuristic approach to control the WIP in its wafer fabrication facilities (fabs). The so called "Loop Control"...
Steffen Kalisch, Robert Ringel, Jorg Weigang