Sciweavers

JCM
2007
76views more  JCM 2007»
13 years 11 months ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...
JCM
2007
90views more  JCM 2007»
13 years 11 months ago
Peak to Average Power Ratio Reduction for Multicarrier Systems Using Dirty Paper Coding
— In this paper, we improve the peak to average power ratio reduction scheme for multicarrier systems proposed by Collings and Clarkson by applying dirty paper coding with peak p...
Pin-Hsun Lin, Shih-Chun Lin, Hsuan-Tien Liu, Hsuan...
JCM
2007
77views more  JCM 2007»
13 years 11 months ago
Design of Optical Access Systems using Computer Modeling
André Richter, Hadrien Louchet, Igor Koltch...
JCM
2007
101views more  JCM 2007»
13 years 11 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
JCM
2007
101views more  JCM 2007»
13 years 11 months ago
Control Mechanism for QoS Guaranteed Multicast Service in OVPN over IP/GMPLS over DWDM
—OVPN over IP/GMPLS over DWDM technology with QoS assurances is considered as a promising approach for the next generation OVPN. In this paper, we suggest a multicast OLSP (Optic...
Jeong-Mi Kim, Oh-Han Kang, Jae-Il Jung, Sung Un Ki...
JCM
2007
156views more  JCM 2007»
13 years 11 months ago
MIMO Link Layer Transmission Techniques Based on Cross Layer Design
Abstract— In this paper, we propose and evaluate the performance of new link layer frame transmission techniques for MIMO (multiple input multiple output) wireless systems from a...
Wessam Ajib, David Haccoun, Jean-François F...
JCM
2007
143views more  JCM 2007»
13 years 11 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JCM
2007
81views more  JCM 2007»
13 years 11 months ago
Some Analysis in Distributed MIMO Systems
Abstract—The predicted capacity gain of a traditional colocated MIMO system is often severely limited in realistic propagation scenarios, especially when the number of antennas b...
Huaiyu Dai, Hongyuan Zhang, Quan Zhou
JCM
2007
177views more  JCM 2007»
13 years 11 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
JCM
2007
68views more  JCM 2007»
13 years 11 months ago
Cost-effective Product Traceability System Based on Widely Distributed Databases
— A cost-effective and easy way of introducing a product traceability system is to start from a small system and gradually extend it to a large-scale system. Traceability systems...
Shirou Wakayama, Yusuke Doi, Satoshi Ozaki, Atsush...