• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 319,768
Next 10 →

Covert Channels through External Interference

by Gaurav Shah, Matt Blaze
"... This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require t ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require

THE EFFECT OF EXTERNAL INTERFERENCE ON AVALANCHE TRANSCEIVER FUNCTIONALITY

by John Barkhausen
"... ABSTRACT: For over 40 years, avalanche transceivers have been helping searchers locate and rescue victims buried in avalanches. They rely on internal electronics receiving and interpreting radio waves being transmitted by the victim’s avalanche transceiver, and their success and usefulness is measur ..."
Abstract - Add to MetaCart
is measured by how quickly and effectively they can follow that signal to the buried victim. Up until now, little has been done to understand the effect that external interference has on this signal, and therefore the effectiveness of the beacon itself. In this study, personal electronic devices were held

Capacity Degradation due to External Interference in Mobile Communication Systems

by Masaharu Hata, Shigeru Tomisato
"... Abstract: Mobile communication systems recently use adjacent frequency bands with each other or with other services, due to the lack of frequency bands. In such situation, the capacity of mobile communication system will be reduced by the external interference from the system using adjacent frequenc ..."
Abstract - Add to MetaCart
Abstract: Mobile communication systems recently use adjacent frequency bands with each other or with other services, due to the lack of frequency bands. In such situation, the capacity of mobile communication system will be reduced by the external interference from the system using adjacent

Chrysso – A Multi-channel Approach to Mitigate External Interference

by Venkatraman Iyer, Matthias Woehrle, Koen Langendoen
"... Abstract—When a wireless sensor network is deployed indoors, sensor nodes often need to compete for channel usage with other, more powerful devices such as 802.11 access points. To mitigate the effects of such external interference we propose Chrysso, a protocol extension specifically designed for d ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Abstract—When a wireless sensor network is deployed indoors, sensor nodes often need to compete for channel usage with other, more powerful devices such as 802.11 access points. To mitigate the effects of such external interference we propose Chrysso, a protocol extension specifically designed

Cognitive Radio: Brain-Empowered Wireless Communications

by Simon Haykin , 2005
"... Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment and use ..."
Abstract - Cited by 1479 (4 self) - Add to MetaCart
the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks. 1) Radio-scene analysis. 2) Channel-state estimation and predictive modeling. 3) Transmit-power control and dynamic spectrum management

Controlled and automatic human information processing: II. Perceptual learning, automatic attending and a general theory

by Richard M. Shiffrin, Walter Schneider - Psychological Review , 1977
"... The two-process theory of detection, search, and attention presented by Schneider and Shiffrin is tested and extended in a series of experiments. The studies demonstrate the qualitative difference between two modes of information processing: automatic detection and controlled search. They trace the ..."
Abstract - Cited by 805 (12 self) - Add to MetaCart
the course of the learning of automatic detection, of categories, and of automaticattention responses. They show the dependence of automatic detection on attending responses and demonstrate how such responses interrupt controlled processing and interfere with the focusing of attention. The learning

Investor Protection and Corporate Governance

by Rafael La Porta, Florencio Lopez-de-Silanes, Andrei Shleifer, Robert Vishny , 1999
"... Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element to the explanations ..."
Abstract - Cited by 559 (11 self) - Add to MetaCart
Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element

Risk-management: coordinating corporate investment and financing policies

by Kenneth A. Froot, David S. Scharfstein, Jeremy C. Stein , 1993
"... This paper develops a general framework for analyzing corporate risk management policies. We begin by observing that if external sources of finance are more costly to corporations than internally generated funds, there will typically be a benefit to hedging: hedging adds value to the extent that it ..."
Abstract - Cited by 540 (15 self) - Add to MetaCart
This paper develops a general framework for analyzing corporate risk management policies. We begin by observing that if external sources of finance are more costly to corporations than internally generated funds, there will typically be a benefit to hedging: hedging adds value to the extent

Risk and protective factors for alcohol and other drug problems in adolescence and early adulthood: Implications for substance abuse prevention

by J. David Hawkins, Richard E Catalano, Janet Y Miller - Psychological Bulletin , 1992
"... The authors suggest that the most promising route to effective strategies for the prevention of adolescent alcohol and other drug problems is through a risk-focused approach. This approach requires the identification of risk factors for drug abuse, identification of methods by which risk factors hav ..."
Abstract - Cited by 693 (18 self) - Add to MetaCart
, Ferguson, & Kopstein, 1990). The consequences of drug abuse are acute on both a personal and a societal level. For the developing young adult, drug and alcohol abuse under-mines motivation, interferes with cognitive processes, contrib-

The Protection of Information in Computer Systems

by Jerome H. Saltzer, Michael D. Schroeder , 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract - Cited by 815 (2 self) - Add to MetaCart
(or other agent external to the protection system) making a request.
Next 10 →
Results 1 - 10 of 319,768
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University