• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 30

Review Theoretical Methods of Domain Structures in Ultrathin Ferroelectric Films: A Review

by Jianyi Liu, Weijin Chen, Biao Wang, Yue Zheng , 2014
"... www.mdpi.com/journal/materials ..."
Abstract - Add to MetaCart
www.mdpi.com/journal/materials

CMU-CyLab-08-007

by Chia-hsin Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, Ahren Studer Adrian Perrig , 2008
"... Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. ..."
Abstract - Add to MetaCart
Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. Secure communication relies on the distribution of au-thentic information among the communicating parties’ devices. This is a challenging problem because devices generally do not share pre-existing secrets. Current secu-rity protocols for distributing initial authentic informa-tion fail to consider the human element. Many protocols do not scale beyond a pair of devices, although people often need to communicate with a group. The few exist-ing group protocols assume that users will always count the number of members and verify the list of members correctly. However, as group size increases, implemen-tations of these protocols become more prone to human error. We present GAnGS, a fully-implemented system for exchanging authentic information between mobile de-vices when they are physically present in the same lo-cation. GAnGS is scalable, appropriate for two or more devices. We implement two user-friendly variants of GAnGS on Nokia N70 camera phones. The first vari-ant, GAnGS-P, is based on an untrusted communication hub. The second variant, GAnGS-T, needs no infrastruc-ture. Both variants use Bluetooth for peer-to-peer wire-less communication during the information exchange. 1

Routing and Broadcasting in Ad-Hoc Networks

by Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Prof Dr, T. Braun, Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Von Frutigen, Prof Dr, T. Braun
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract - Add to MetaCart
the work on various conferences, for which I thank him. I would also like to thank Prof. Dr. Roger Wattenhofer, responsible for the Koreferat of this work. Also, Prof. Dr. Oscar Nierstrasz who was willing to be the co-examinator of this work deserves many thanks. Many thanks go to my colleagues of the RVS

Title: Banking System Stability. A Cross-Atlantic Perspective

by Mark Carey, René M. Stulz, Stefan Straetmans, Casper De
"... A particularly important sector for the stability of financial systems is the banking sector. Banks play a central role in the money creation process and in the payment system. Moreover, bank credit is an important factor in the financing of investment and growth. Faltering banking systems have ..."
Abstract - Add to MetaCart
A particularly important sector for the stability of financial systems is the banking sector. Banks play a central role in the money creation process and in the payment system. Moreover, bank credit is an important factor in the financing of investment and growth. Faltering banking systems have

RICE UNIVERSITY Regime Change: Sampling Rate vs. Bit-Depth in Compressive Sensing

by Jason Noah Laska , 2011
"... The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of t ..."
Abstract - Add to MetaCart
of the signal complexity. In practice, this enables lower sampling rates that can be more easily achieved by current hardware designs. The primary bottleneck that limits ADC sam-pling rates is quantization, i.e., higher bit-depths impose lower sampling rates. Thus, the decreased sampling rates of CS ADCs

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

unknown title

by unknown authors
"... ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi- ..."
Abstract - Add to MetaCart
ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi-

Approved by:

by Christopher Charles Weigle, Russell M. Taylor Ii, Elizabeth Bullitt Reader, Christopher G. Healey, Stephen M. Pizer, Mary Whitton, Reader C, Christopher Charles Weigle , 2006
"... ii iii CHRISTOPHER CHARLES WEIGLE: Displays for Exploration and Comparison of Nested ..."
Abstract - Add to MetaCart
ii iii CHRISTOPHER CHARLES WEIGLE: Displays for Exploration and Comparison of Nested

Copyright and use of this thesis

by James C. Makinson, James C. Makinson , 2013
"... This thesis must be used in accordance with the provisions of the Copyright Act 1968. Reproduction of material protected by copyright may be an infringement of copyright and copyright owners may be entitled to take legal action against persons who infringe their copyright. Section 51 (2) of the Copy ..."
Abstract - Add to MetaCart
This thesis must be used in accordance with the provisions of the Copyright Act 1968. Reproduction of material protected by copyright may be an infringement of copyright and copyright owners may be entitled to take legal action against persons who infringe their copyright. Section 51 (2) of the Copyright Act permits an authorized officer of a university library or archives to provide a copy (by communication or otherwise) of an unpublished thesis kept in the library or archives, to a person who satisfies the authorized officer that he or she requires the reproduction for the purposes of research or study.

Dissertação submetida como requisito parcial para obtenção do grau de Mestre em Finanças

by Áurea Ponte Marques
"... An approach based on Extreme Value Theory as a measure to quantify market risk of equity securities and portfolios ..."
Abstract - Add to MetaCart
An approach based on Extreme Value Theory as a measure to quantify market risk of equity securities and portfolios
Results 21 - 30 of 30
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University