Sciweavers

304 search results - page 35 / 61
» Measuring the Vulnerability of Interconnection Networks in E...
Sort
View
ETFA
2008
IEEE
14 years 2 months ago
Real-time enabled debugging for distributed systems
The distribution of real-time tasks in a networked environment in principle has several advantages, above all a high degree of flexibility easing system extension and replacement...
Georg Gaderer, Patrick Loschmidt, Thilo Sauter
ICC
2007
IEEE
115views Communications» more  ICC 2007»
13 years 11 months ago
Super-Wideband SSN Suppression in High-Speed Digital Communication Systems by Using Multi-Via Electromagnetic Bandgap Structures
With the advance of semiconductor manufacturing, There are many approaches to deal with these problems. EDA, and VLSI design technologies, circuits with even higher Adding discrete...
MuShui Zhang, YuShan Li, LiPing Li, Chen Jia
JNW
2008
111views more  JNW 2008»
13 years 7 months ago
Wireless Sensor Network for Wearable Physiological Monitoring
Wearable physiological monitoring system consists of an array of sensors embedded into the fabric of the wearer to continuously monitor the physiological parameters and transmit wi...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
ADBIS
2006
Springer
93views Database» more  ADBIS 2006»
14 years 1 months ago
An On-Line Reorganization Framework for SAN File Systems
While the cost per megabyte of magnetic disk storage is economical, organizations are alarmed by the increasing cost of managing storage. Storage Area Network (SAN) architectures ...
Shahram Ghandeharizadeh, Shan Gao, Chris Gahagan, ...
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...