The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
This paper concerns the validity of a widely used method for estimating the architecture-level mean time to failure (MTTF) due to soft errors. The method first calculates the fai...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
Abstract— OFDM systems are susceptible to receiver impairments such as IQ imbalance and phase noise. These impairments can severely degrade the achievable effective signalto-nois...
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...