Sciweavers

11376 search results - page 80 / 2276
» Willow System Demonstration
Sort
View
GLOBECOM
2010
IEEE
15 years 2 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
CORR
2011
Springer
198views Education» more  CORR 2011»
14 years 11 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
IJDMBC
2010
115views more  IJDMBC 2010»
14 years 11 months ago
Near Optimum Power Control and Precoding under Fairness Constraints in Network MIMO Systems
Abstract--We consider the problem of setting the uplink signalto-noise-and-interference (SINR) target and allocating transmit powers for mobile stations in multicell spatial multip...
Gábor Fodor, Mikael Johansson, Pablo Soldat...
TSP
2010
14 years 11 months ago
Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems
Abstract--This paper proposes a training-based channel estimation scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless m...
Tsung-Hui Chang, Wei-Cheng Chiang, Yao-Win Peter H...
ASPLOS
2011
ACM
14 years 8 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...