Sciweavers

193 search results - page 22 / 39
» Physical Access Control for Captured RFID Data
Sort
View
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 9 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
CIKM
2011
Springer
12 years 8 months ago
Detecting anomalies in graphs with numeric labels
This paper presents Yagada, an algorithm to search labelled graphs for anomalies using both structural data and numeric attributes. Yagada is explained using several security-rela...
Michael Davis, Weiru Liu, Paul Miller, George Redp...
EUC
2006
Springer
14 years 8 days ago
An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks
Abstract. In this paper, we propose a new medium access control protocol for wireless sensor networks, named LE-MAC (Latency and Energy aware MAC) that aims to minimize data delive...
Changsu Suh, Deepesh Man Shrestha, Young-Bae Ko
ICC
2009
IEEE
151views Communications» more  ICC 2009»
14 years 3 months ago
A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes
—In this paper, we propose a physical (PHY) - medium access control (MAC) cross-layer protocol for ad hoc networks with antenna-array-equipped nodes that employ single-antenna tr...
Ioannis Spyropoulos, James R. Zeidler
ITC
2003
IEEE
136views Hardware» more  ITC 2003»
14 years 1 months ago
Adapting JTAG for AC Interconnect Testing
The use of AC coupled interconnects to provide communication paths between devices is increasing. The existing IEEE 1149.1 boundary scan standard [1] (JTAG) has limitations that h...
Lee Whetsel