Sciweavers

2038 search results - page 156 / 408
» Loops under Strategies
Sort
View
TRUST
2009
Springer
15 years 11 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
15 years 11 months ago
Space-time scaling laws for self-triggered control
— Feedback control laws have been traditionally treated as periodic tasks when implemented on digital platforms. However, the growing complexity of systems calls for efficient i...
Adolfo Anta Martinez, Paulo Tabuada
FGCN
2008
IEEE
236views Communications» more  FGCN 2008»
15 years 11 months ago
Dimensioning of Next Generation Networks Signaling Gateway for Improving a Quality of Service Target
In this paper, we propose a set of dimensioning rules, which deliver high quality sessionbased services over a Next Generation Network based IP/MPLS transport infrastructure. In p...
Cherif Ghazel, Leila Saidane
GLOBECOM
2008
IEEE
15 years 11 months ago
Near-Optimum Power Allocation for Outage Restricted Distributed MIMO Multi-Hop Networks
Abstract—The throughput of multi-hop communication systems can significantly be increased by the application of MIMO concepts. To utilize the physical resources in an efficient...
Dirk Wübben, Yidong Lang
CLUSTER
2006
IEEE
15 years 10 months ago
Heterogeneous Parallel Computing in Remote Sensing Applications: Current Trends and Future Perspectives
Heterogeneous networks of computers have rapidly become a very promising commodity computing solution, expected to play a major role in the design of high performance computing sy...
Antonio J. Plaza