Sciweavers

1064 search results - page 212 / 213
» The Case for Mobile OLAP
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 6 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
IBMRD
2011
112views more  IBMRD 2011»
13 years 3 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
TON
2010
163views more  TON 2010»
13 years 3 months ago
Usage Patterns in an Urban WiFi Network
While WiFi was initially designed as a local-area access network, mesh networking technologies have led to increasingly expansive deployments of WiFi networks. In urban environment...
Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelke...
CORR
2011
Springer
165views Education» more  CORR 2011»
13 years 14 days ago
Heterogeneous Cellular Networks with Flexible Cell Association: A Comprehensive Downlink SINR Analysis
In this paper we develop a tractable framework for SINR analysis in downlink heterogeneous cellular networks (HCNs) with flexible cell association policies. The HCN is modeled as...
Han-Shin Jo, Young Jin Sang, Ping Xia, Jeffrey G. ...
INFOCOM
2011
IEEE
13 years 12 days ago
Throughput and delay scaling of general cognitive networks
—There has been recent interest within the networking research community to understand how performance scales in cognitive networks with overlapping n primary nodes and m seconda...
Wentao Huang, Xinbing Wang