Sciweavers

141 search results - page 23 / 29
» Robustness of Causal Claims
Sort
View
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TON
1998
112views more  TON 1998»
13 years 7 months ago
IP switching - ATM under IP
IP traffic on the Internet and private enterprise networks has been growing exponentially for some time. This growth is beginning to stress the traditional, processor based design...
Peter Newman, Greg Minshall, Thomas L. Lyon
GLOBECOM
2010
IEEE
13 years 4 months ago
High-Diversity Cooperative Spectrum Sensing in Cognitive Radio Networks
This paper develops a cooperative scheme among cognitive radios (CRs) to increase the spectrum sensing performance. CRs adaptively transmit local binary decisions to a fusion cente...
Guobing Li, Alfonso Cano, Shihua Zhu
SIAMSC
2010
155views more  SIAMSC 2010»
13 years 2 months ago
Quasi-Newton Methods on Grassmannians and Multilinear Approximations of Tensors
In this paper we proposed quasi-Newton and limited memory quasi-Newton methods for objective functions defined on Grassmannians or a product of Grassmannians. Specifically we defin...
Berkant Savas, Lek-Heng Lim
SOSP
2005
ACM
14 years 4 months ago
Mondrix: memory isolation for linux using mondriaan memory protection
This paper presents the design and an evaluation of Mondrix, a version of the Linux kernel with Mondriaan Memory Protection (MMP). MMP is a combination of hardware and software th...
Emmett Witchel, Junghwan Rhee, Krste Asanovic