Sciweavers

1989 search results - page 386 / 398
» cost 2010
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 7 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
GIS
2010
ACM
13 years 7 months ago
Spatiotemporal summarization of traffic data streams
With resource-efficient summarization and accurate reconstruction of the historic traffic sensor data, one can effectively manage and optimize transportation systems (e.g., road n...
Bei Pan, Ugur Demiryurek, Farnoush Banaei Kashani,...
GLOBECOM
2010
IEEE
13 years 7 months ago
Energy Saving Performance Comparison of Coordinated Multi-Point Transmission and Wireless Relaying
Currently, two cooperative transmission strategies, Coordinated Multi-Point (CoMP) Transmission and wireless relaying, are expected to be deployed in future cellular systems to imp...
Dongxu Cao, Sheng Zhou, Chao Zhang, Zhisheng Niu
GLOBECOM
2010
IEEE
13 years 7 months ago
ViVUD: Virtual Server Cluster Based View-Upload Decoupling for Multi-Channel P2P Video Streaming Systems
Despite the success to deliver increasingly large number of channels to millions of users, the current multichannel P2P video streaming systems still suffer several fundamental per...
Chao Liang, Yong Liu
GLOBECOM
2010
IEEE
13 years 7 months ago
Space-Time Shift Keying: A Unified MIMO Architecture
In this paper, we propose a novel Space-Time Shift Keying (STSK) modulation scheme for MIMO communication systems, where the concept of spatial modulation is extended to include bo...
Shinya Sugiura, Sheng Chen, Lajos Hanzo