Sciweavers

CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 8 months ago
Optimization and AMS Modeling for Design of an Electrostatic Vibration Energy Harvester's Conditioning Circuit with an Auto-Adap
This paper presents an analysis and system-level design of a capacitive harvester of vibration energy composed from a mechanical resonator, capacitive transducer and a conditioning...
Dimitri Galayko, Philippe Basset, Ayyaz Mahmood Pa...
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 8 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 8 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 8 months ago
Authentication from matrix conjugation
Abstract. We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter is equivalen...
Dima Grigoriev, Vladimir Shpilrain
CORR
2008
Springer
86views Education» more  CORR 2008»
13 years 8 months ago
Megasonic Enhanced Electrodeposition
A novel way of filling high aspect ratio vertical interconnection (microvias) is presented. High frequency acoustic streaming at megasonic frequencies enables the decrease of the N...
Jens Georg Kaufmann, Marc P. Y. Desmulliez, D. Pri...
CORR
2008
Springer
61views Education» more  CORR 2008»
13 years 8 months ago
Design Methodology and Manufacture of a Microinductor
Potential core materials to supersede ferrite in the 0.5-10 MHz frequency range are investigated. The performance of electrodeposited nickel-iron, cobalt-iron-copper alloys and the...
David Flynn, Marc P. Y. Desmulliez
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 8 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang