Sciweavers

8776 search results - page 1723 / 1756
» Robust Data Clustering
Sort
View
CODES
2006
IEEE
14 years 5 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
ICMCS
2006
IEEE
185views Multimedia» more  ICMCS 2006»
14 years 5 months ago
DMB (Digital Multimedia Broadcasting) Voice EPG Application
Recently, mobile TV is becoming a mainstream service in mobile broadcasting scenario, where requires lots of mobile factors such as robust transmission, high performance and easy ...
Bong-Ho Lee, So Park, Heejeong Kim, Chung-Hyun Ahn...
INFOCOM
2006
IEEE
14 years 5 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 5 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 5 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
« Prev « First page 1723 / 1756 Last » Next »