Sciweavers

349 search results - page 53 / 70
» Improvisation principles and techniques for design
Sort
View
WOWMOM
2009
ACM
124views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
VAPS: Positioning with spatial constraints
The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
DSN
2007
IEEE
14 years 1 months ago
Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions
This paper concerns the validity of a widely used method for estimating the architecture-level mean time to failure (MTTF) due to soft errors. The method first calculates the fai...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
ISCAS
2007
IEEE
178views Hardware» more  ISCAS 2007»
14 years 1 months ago
On the Joint Compensation of IQ Imbalances and Phase Noise in MIMO-OFDM Systems
Abstract— OFDM systems are susceptible to receiver impairments such as IQ imbalance and phase noise. These impairments can severely degrade the achievable effective signalto-nois...
Qiyue Zou, Alireza Tarighat, Ali H. Sayed
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
PET
2005
Springer
14 years 1 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey