Old City Publishing

Displaying 1-9 of 9 results

  • White Papers // Dec 2012

    Optimal Packet Size for Network Throughput With Time-Bound Fairness in IEEE 802.11 Networks

    With the popularity of IEEE 802.11 networks, it has become increasingly important to analyze the performance of IEEE 802.11 protocols more accurately. The IEEE 802.11 Distributed Coordination Function (DCF) protocol exhibits fairness problem in scenarios with asymmetric topology. Existing strategies mostly aim at the fairness issue without considering the convergence...

    Provided By Old City Publishing

  • White Papers // May 2012

    Error Correction via Restorative Feedback in M-ary Logic Circuits

    In this paper, the authors present an error correction method known as Restorative Feed-Back (RFB) that provides error-correction for both permanent and temporal logic faults in any M-ary logic system. The RFB method is a variant of Triple Modular Redundancy (TMR), which achieves error correction in logic circuits by using...

    Provided By Old City Publishing

  • White Papers // Jan 2012

    Reversible Logic Synthesis Based on Decision Diagram Variable Ordering

    Reversible logic synthesis is important for the design of conventional logic systems such as adiabatic logic and also for quantum logic systems since all quantum logic gates are necessarily reversible in nature. A framework is presented that improves reversible logic synthesis by employing a dynamically determined variable order for Quantum...

    Provided By Old City Publishing

  • White Papers // May 2011

    Dependable Over-the-Air Programming

    Wireless Sensor Networks (WSNs) represent an emerging set of technologies that will have profound effects across a wide range of industrial, scientific, and governmental applications. In the civilian sector, probably the largest WSNs currently discussed, prototypically implemented, and tested are WSNs for Critical Infrastructure Protection (CIP) like for example oil...

    Provided By Old City Publishing

  • White Papers // Mar 2011

    Proactive Threshold Cryptosystem for EPC Tags

    The authors define three privacy-preserving solutions to the problem of distributing secrets between manufacturers and vendors of items labeled with Electronic Product Code (EPC) Gen2 tags. The solutions rely on the use of an anonymous threshold secret sharing scheme that allows the exchange of blinded information between readers and tags....

    Provided By Old City Publishing

  • White Papers // Jun 2010

    A Novel Approach Against Reactive Jamming Attacks

    There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices. To avoid the problems in existing methods, the authors propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any...

    Provided By Old City Publishing

  • White Papers // Feb 2010

    An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

    Designing a user authentication protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and sensor node has limited energy, processing and storage resources. Recently, several authentication schemes have been proposed. This paper shows some security problems and design weaknesses in those schemes. Furthermore,...

    Provided By Old City Publishing

  • White Papers // Aug 2009

    Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption

    Specifying information needs declaratively has turned out to be useful in the context of databases systems, and researchers have applied this approach to sensor networks. The first step to retrieve data from a sensor network in this way is the dissemination of the query. Energy-efficient query dissemination plays an important...

    Provided By Old City Publishing

  • White Papers // May 2009

    An Integrated Protocol for Maintaining Connectivity and Coverage Under Probabilistic Models for Wireless Sensor Networks

    The authors propose a distributed connectivity maintenance protocol that explicitly accounts for the probabilistic nature of wireless communication links. The proposed protocol is simple to implement and it achieves a given target communication quality between nodes, which is quantified by the minimum packet delivery rate between any pair of nodes...

    Provided By Old City Publishing

  • White Papers // May 2009

    An Integrated Protocol for Maintaining Connectivity and Coverage Under Probabilistic Models for Wireless Sensor Networks

    The authors propose a distributed connectivity maintenance protocol that explicitly accounts for the probabilistic nature of wireless communication links. The proposed protocol is simple to implement and it achieves a given target communication quality between nodes, which is quantified by the minimum packet delivery rate between any pair of nodes...

    Provided By Old City Publishing

  • White Papers // Aug 2009

    Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption

    Specifying information needs declaratively has turned out to be useful in the context of databases systems, and researchers have applied this approach to sensor networks. The first step to retrieve data from a sensor network in this way is the dissemination of the query. Energy-efficient query dissemination plays an important...

    Provided By Old City Publishing

  • White Papers // Jun 2010

    A Novel Approach Against Reactive Jamming Attacks

    There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices. To avoid the problems in existing methods, the authors propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any...

    Provided By Old City Publishing

  • White Papers // May 2011

    Dependable Over-the-Air Programming

    Wireless Sensor Networks (WSNs) represent an emerging set of technologies that will have profound effects across a wide range of industrial, scientific, and governmental applications. In the civilian sector, probably the largest WSNs currently discussed, prototypically implemented, and tested are WSNs for Critical Infrastructure Protection (CIP) like for example oil...

    Provided By Old City Publishing

  • White Papers // Dec 2012

    Optimal Packet Size for Network Throughput With Time-Bound Fairness in IEEE 802.11 Networks

    With the popularity of IEEE 802.11 networks, it has become increasingly important to analyze the performance of IEEE 802.11 protocols more accurately. The IEEE 802.11 Distributed Coordination Function (DCF) protocol exhibits fairness problem in scenarios with asymmetric topology. Existing strategies mostly aim at the fairness issue without considering the convergence...

    Provided By Old City Publishing

  • White Papers // Feb 2010

    An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

    Designing a user authentication protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and sensor node has limited energy, processing and storage resources. Recently, several authentication schemes have been proposed. This paper shows some security problems and design weaknesses in those schemes. Furthermore,...

    Provided By Old City Publishing

  • White Papers // Mar 2011

    Proactive Threshold Cryptosystem for EPC Tags

    The authors define three privacy-preserving solutions to the problem of distributing secrets between manufacturers and vendors of items labeled with Electronic Product Code (EPC) Gen2 tags. The solutions rely on the use of an anonymous threshold secret sharing scheme that allows the exchange of blinded information between readers and tags....

    Provided By Old City Publishing

  • White Papers // Jan 2012

    Reversible Logic Synthesis Based on Decision Diagram Variable Ordering

    Reversible logic synthesis is important for the design of conventional logic systems such as adiabatic logic and also for quantum logic systems since all quantum logic gates are necessarily reversible in nature. A framework is presented that improves reversible logic synthesis by employing a dynamically determined variable order for Quantum...

    Provided By Old City Publishing

  • White Papers // May 2012

    Error Correction via Restorative Feedback in M-ary Logic Circuits

    In this paper, the authors present an error correction method known as Restorative Feed-Back (RFB) that provides error-correction for both permanent and temporal logic faults in any M-ary logic system. The RFB method is a variant of Triple Modular Redundancy (TMR), which achieves error correction in logic circuits by using...

    Provided By Old City Publishing