Sciweavers

204 search results - page 28 / 41
» On the Design and Implementation of an Efficient DAA Scheme
Sort
View
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
HICSS
2008
IEEE
133views Biometrics» more  HICSS 2008»
14 years 1 months ago
A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...
DFT
2003
IEEE
132views VLSI» more  DFT 2003»
14 years 11 days ago
Level-Hybrid Optoelectronic TESH Interconnection Network
This paper discusses a hybrid optoelectronic scheme for a new interconnection network, "Tori connected mESHes (TESH)". The major features of TESH are the following: it i...
Vijay K. Jain, Glenn H. Chapman
ENGL
2007
141views more  ENGL 2007»
13 years 7 months ago
A Novel Multi-Agent Controller for Dynamic Systems based on Supervisory Loop Approach
— This paper presents a new intelligent agent supervisory loop based approach for dynamic system control. The scheme consists of three software agents that work in an autonomous ...
Sukumar Kamalasadan
TCOM
2008
119views more  TCOM 2008»
13 years 7 months ago
Maximum likelihood detection for differential unitary space-time modulation with carrier frequency offset
Can conventional differential unitary space time modulation (DUSTM) be applied when there is an unknown carrier frequency offset (CFO)? This paper answers this question affirmative...
Feifei Gao, Tao Cui, Arumugam Nallanathan, Chintha...