Results 1 - 10
of
319,768
Covert Channels through External Interference
"... This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require t ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require
THE EFFECT OF EXTERNAL INTERFERENCE ON AVALANCHE TRANSCEIVER FUNCTIONALITY
"... ABSTRACT: For over 40 years, avalanche transceivers have been helping searchers locate and rescue victims buried in avalanches. They rely on internal electronics receiving and interpreting radio waves being transmitted by the victim’s avalanche transceiver, and their success and usefulness is measur ..."
Abstract
- Add to MetaCart
is measured by how quickly and effectively they can follow that signal to the buried victim. Up until now, little has been done to understand the effect that external interference has on this signal, and therefore the effectiveness of the beacon itself. In this study, personal electronic devices were held
Capacity Degradation due to External Interference in Mobile Communication Systems
"... Abstract: Mobile communication systems recently use adjacent frequency bands with each other or with other services, due to the lack of frequency bands. In such situation, the capacity of mobile communication system will be reduced by the external interference from the system using adjacent frequenc ..."
Abstract
- Add to MetaCart
Abstract: Mobile communication systems recently use adjacent frequency bands with each other or with other services, due to the lack of frequency bands. In such situation, the capacity of mobile communication system will be reduced by the external interference from the system using adjacent
Chrysso – A Multi-channel Approach to Mitigate External Interference
"... Abstract—When a wireless sensor network is deployed indoors, sensor nodes often need to compete for channel usage with other, more powerful devices such as 802.11 access points. To mitigate the effects of such external interference we propose Chrysso, a protocol extension specifically designed for d ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Abstract—When a wireless sensor network is deployed indoors, sensor nodes often need to compete for channel usage with other, more powerful devices such as 802.11 access points. To mitigate the effects of such external interference we propose Chrysso, a protocol extension specifically designed
Cognitive Radio: Brain-Empowered Wireless Communications
, 2005
"... Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment and use ..."
Abstract
-
Cited by 1479 (4 self)
- Add to MetaCart
the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks. 1) Radio-scene analysis. 2) Channel-state estimation and predictive modeling. 3) Transmit-power control and dynamic spectrum management
Controlled and automatic human information processing: II. Perceptual learning, automatic attending and a general theory
- Psychological Review
, 1977
"... The two-process theory of detection, search, and attention presented by Schneider and Shiffrin is tested and extended in a series of experiments. The studies demonstrate the qualitative difference between two modes of information processing: automatic detection and controlled search. They trace the ..."
Abstract
-
Cited by 805 (12 self)
- Add to MetaCart
the course of the learning of automatic detection, of categories, and of automaticattention responses. They show the dependence of automatic detection on attending responses and demonstrate how such responses interrupt controlled processing and interfere with the focusing of attention. The learning
Investor Protection and Corporate Governance
, 1999
"... Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element to the explanations ..."
Abstract
-
Cited by 559 (11 self)
- Add to MetaCart
Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element
Risk-management: coordinating corporate investment and financing policies
, 1993
"... This paper develops a general framework for analyzing corporate risk management policies. We begin by observing that if external sources of finance are more costly to corporations than internally generated funds, there will typically be a benefit to hedging: hedging adds value to the extent that it ..."
Abstract
-
Cited by 540 (15 self)
- Add to MetaCart
This paper develops a general framework for analyzing corporate risk management policies. We begin by observing that if external sources of finance are more costly to corporations than internally generated funds, there will typically be a benefit to hedging: hedging adds value to the extent
Risk and protective factors for alcohol and other drug problems in adolescence and early adulthood: Implications for substance abuse prevention
- Psychological Bulletin
, 1992
"... The authors suggest that the most promising route to effective strategies for the prevention of adolescent alcohol and other drug problems is through a risk-focused approach. This approach requires the identification of risk factors for drug abuse, identification of methods by which risk factors hav ..."
Abstract
-
Cited by 693 (18 self)
- Add to MetaCart
, Ferguson, & Kopstein, 1990). The consequences of drug abuse are acute on both a personal and a societal level. For the developing young adult, drug and alcohol abuse under-mines motivation, interferes with cognitive processes, contrib-
The Protection of Information in Computer Systems
, 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract
-
Cited by 815 (2 self)
- Add to MetaCart
(or other agent external to the protection system) making a request.
Results 1 - 10
of
319,768