Sciweavers

2601 search results - page 463 / 521
» Quantum Network Coding
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 2 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
MSS
2007
IEEE
86views Hardware» more  MSS 2007»
14 years 1 months ago
RAIF: Redundant Array of Independent Filesystems
Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems either do not suppo...
Nikolai Joukov, Arun M. Krishnakumar, Chaitanya Pa...
VTC
2007
IEEE
184views Communications» more  VTC 2007»
14 years 1 months ago
Adaptive Spread Spectrum Multicarrier Multiple-Access for UWB Systems
—Ultra-wideband (UWB) has emerged as an exciting technology for short range, high data rate wireless personal area networks (WPAN) applications. The multiband orthogonal frequenc...
Antoine Stephan, Jean-Yves Baudais, Jean-Fran&cced...
ATAL
2007
Springer
14 years 1 months ago
A formal model for situated semantic alignment
Ontology matching is currently a key technology to achieve the semantic alignment of ontological entities used by knowledge-based applications, and therefore to enable their inter...
Manuel Atencia, W. Marco Schorlemmer
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...