SensoLab group
Title | SensoLab group |
---|
Latest research outputs
Sort by Date Title
Phase-change technologies: from PCRAM to probe-storage to processors
Wright, C., Ashawaraya, P., Ashwin, P., Aziz, M., Hicken, R., Kohary, K., Liu, Y., Marmier, A., Shah, P., Vazquez, J. and Wang, L. 2010. Phase-change technologies: from PCRAM to probe-storage to processors. European Phase Change and Ovonic Conference. Milano 05 - 07 Sep 2010Conference paper
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140Conference paper
Iterative OFDM receiver with channel estimation and frequency-offset compensation.
Nguyen, H., Choi, J. and Institute of Electrical and Electronics Engineers 2006. Iterative OFDM receiver with channel estimation and frequency-offset compensation. IEEE. https://doi.org/10.1109/ICC.2006.255362Conference paper
Optimum performance model of ARQ protocol under adaptive modulation scheme.
Li, Y., Nguyen, H., Xing, W. and Institute of Electrical and Electronics Engineers 2008. Optimum performance model of ARQ protocol under adaptive modulation scheme. IEEE. pp. 225-229 https://doi.org/10.1109/ICC.2008.49Conference paper
Layered groupwise STBC: list-based decoding using flexible length.
Nguyen, H., Choi, J. and Institute of Electrical and Electronics Engineers 2008. Layered groupwise STBC: list-based decoding using flexible length. IEEE. pp. 703-707 https://doi.org/10.1109/ISSSTA.2008.137Conference paper
An efficient signal detection algorithm for 3GPP LTE downlink.
Nguyen, H. 2010. An efficient signal detection algorithm for 3GPP LTE downlink. Palelogu, C. (ed.) IEEE. pp. 77-81 https://doi.org/10.1109/ICDT.2010.22Conference paper
Performance bounds for MMSE-based signal detection in LTE downlink
Nguyen, H. 2010. Performance bounds for MMSE-based signal detection in LTE downlink. IEEE.Conference paper
Network coding-based ARQ retransmission strategies for two-way wireless relay networks.
Vien, Q., Tran, L., Nguyen, H. and Institute of Electrical and Electronics Engineers 2010. Network coding-based ARQ retransmission strategies for two-way wireless relay networks. IEEE. pp. 180-184Conference paper
Efficient ARQ retransmission schemes for two-way relay networks.
Vien, Q., Tran, L. and Nguyen, H. 2011. Efficient ARQ retransmission schemes for two-way relay networks. Journal of Communication Software and Systems. 7 (1).Article
Radio-over-fibre to increase effective coverage of motorway access networks.
Xing, W., Li, Y., Nguyen, H. and Zheng, J. 2009. Radio-over-fibre to increase effective coverage of motorway access networks. International Journal of Communication Networks and Distributed Systems. 2 (2/3), pp. 331-351. https://doi.org/10.1504/IJCNDS.2009.022338Article
Iterative (turbo processing) receiver design of OFDM systems in the presence of carrier frequency offset.
Nguyen, H., Choi, J. and Tianfield, H. 2010. Iterative (turbo processing) receiver design of OFDM systems in the presence of carrier frequency offset. International Transactions on Systems Science and Applications. 6 (1), pp. 82-93.Article
DALICA: intelligent agents for user profile deduction.
Costantini, S., Mostarda, L., Tocchio, A., Tsintza, P. and Knowledge Systems Institute Graduate School. 2007. DALICA: intelligent agents for user profile deduction. I. Illinois Knowledge Systems Institute Graduate School,.Conference paper
Agents and security in a cultural assets transport scenario.
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2007. Agents and security in a cultural assets transport scenario. Workshop from Objects to Agents.. Genova, Italy 24 - 25 Sep 2007Conference paper
A geo time authentication system.
Mostarda, L., Tocchio, A., Inverardi, P. and Costantini, S. 2007. A geo time authentication system. Springer. https://doi.org/10.1007/978-0-387-73655-6_9Conference paper
Place and time authentication of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2008. Place and time authentication of cultural assets. Springer.Conference paper
A state machine-based approach for reliable adaptive distributed systems.
Mostarda, L., Sykes, D. and Dulay, N. 2010. A state machine-based approach for reliable adaptive distributed systems. Sterritt, R. and McCann, J. (ed.) IEEE. https://doi.org/10.1109/EASe.2010.19Conference paper
A policy-based publish/subscribe middleware for sense-and-react applications
Russello, G., Mostarda, L. and Dulay, N. 2011. A policy-based publish/subscribe middleware for sense-and-react applications. Journal of Systems and Software. 84 (4), pp. 638-654. https://doi.org/10.1016/j.jss.2010.10.023Article
A distributed intrusion detection approach for secure software architecture.
Inverardi, P. and Mostarda, L. 2005. A distributed intrusion detection approach for secure software architecture. Springer. https://doi.org/10.1007/11494713_12Conference paper
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach.
Inverardi, P., Mostarda, L., Tivoli, M. and Autili, M. 2005. Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. IEEE. pp. 405-409Conference paper
A distributed monitoring system for enhancing security and dependability at architectural level.
Inverardi, P. and Mostarda, L. 2007. A distributed monitoring system for enhancing security and dependability at architectural level. Springer. https://doi.org/10.1109/AINA.2006.145Conference paper
Distributed IDSs for enhancing security in mobile wireless sensor networks.
Inverardi, P., Mostarda, L. and Navarra, A. 2006. Distributed IDSs for enhancing security in mobile wireless sensor networks. 20th International Conference on Advanced Information Networking and Applications (AINA). IEEE. pp. 116-120 https://doi.org/10.1109/AINA.2006.145Conference paper
DESERT: a decentralized monitoring tool generator.
Inverardi, P. and Mostarda, L. 2007. DESERT: a decentralized monitoring tool generator. IEEE.Conference paper
Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems
Autili, M., Mostarda, L., Navarra, A. and Tivoli, M. 2008. Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems. Journal of Systems and Software. 81 (12), pp. 2210-2236. https://doi.org/10.1016/j.jss.2008.04.006Article
Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks.
Mostarda, L. and Navarra, A. 2008. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks. 4 (2), pp. 83-109. https://doi.org/10.1080/15501320802001119Article
DALICA: Agent-based ambient intelligence for cultural-heritage scenarios
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2008. DALICA: Agent-based ambient intelligence for cultural-heritage scenarios. IEEE Intelligent Systems. 23 (2), pp. 34-41. https://doi.org/10.1109/MIS.2008.24Article
ESCAPE: a component-based policy framework for sense and react applications.
Russello, G., Mostarda, L. and Dulay, N. 2008. ESCAPE: a component-based policy framework for sense and react applications. Springer. https://doi.org/10.1007/978-3-540-87891-9_14Conference paper
Policies for self tuning home networks.
Pediaditakis, D., Mostarda, L., Dong, C. and Dulay, N. 2009. Policies for self tuning home networks. POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks.. London 20 - 22 Jul 2009 pp. 29-32Conference paper
Context-based authentication and transport of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2010. Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing. 14 (4), pp. 321-334. https://doi.org/10.1007/s00779-009-0233-8Article
An architectural framework for analyzing tradeoffs between software security and performance.
Cortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N. 2010. An architectural framework for analyzing tradeoffs between software security and performance. ISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010. Prague 23 - 25 Jun 2010 pp. 1-18Conference paper
Distributed fault tolerant controllers
Mostarda, L., Ball, R. and Dulay, N. 2010. Distributed fault tolerant controllers. Springer. https://doi.org/10.1007/978-3-642-13645-0_11Conference paper
Distributed orchestration of pervasive services.
Mostarda, L., Marinovic, S. and Dulay, N. 2010. Distributed orchestration of pervasive services. and Applications. IEEE. pp. 166-173 https://doi.org/10.1109/AINA.2010.100Conference paper
Formalizing homogeneous language embeddings.
Clark, T. and Tratt, L. 2010. Formalizing homogeneous language embeddings. Electronic Notes in Theoretical Computer Science. 253 (7), pp. 75-88. https://doi.org/10.1016/j.entcs.2010.08.033Article
Advanced modelling made simple with the Gmodel metalanguage.
Bettin, J. and Clark, T. 2010. Advanced modelling made simple with the Gmodel metalanguage. Association for Computing Machinery (ACM). https://doi.org/10.1145/1866272.1866283Conference paper
MobDSL: a domain specific language for multiple mobile platform deployment
Kramer, D., Clark, T. and Ousena, S. 2010. MobDSL: a domain specific language for multiple mobile platform deployment. IEEE. https://doi.org/10.1109/NESEA.2010.5678062Conference paper
Multiparadigm programming: guest editors' introduction. IEEE Software, 27 (5) . pp. 2-7. ISSN 0740-7459
Wampler, D. and Clark, T. 2010. Multiparadigm programming: guest editors' introduction. IEEE Software, 27 (5) . pp. 2-7. ISSN 0740-7459. IEEE.Edited Journal
Multiparadigm programming in industry: a discussion with Neal Ford and Brian Goetz.
Wampler, D., Clark, T., Ford, N. and Goetz, B. 2010. Multiparadigm programming in industry: a discussion with Neal Ford and Brian Goetz. IEEE Software. 27 (5), pp. 61-64. https://doi.org/10.1109/MS.2010.121Article
Implementation of non-pipelined and pipelined data encryption standard (DES) using Xilinx Virtex-6 FPGA technology.
Ever, E., Taherkhani, S. and Gemikonakli, O. 2010. Implementation of non-pipelined and pipelined data encryption standard (DES) using Xilinx Virtex-6 FPGA technology. IEEE. pp. 1257-1262 https://doi.org/10.1109/CIT.2010.227Conference paper
Performance modelling of virtualized servers.
Gemikonakli, O., Ever, E. and Gemikonakli, E. 2010. Performance modelling of virtualized servers. IEEE. pp. 434-440 https://doi.org/10.1109/UKSIM.2010.86Conference paper
Performability modelling of a Kerberos server with frequent key renewal under pseudo-secure conditions for increased security
Ever, E., Kirsal, Y. and Gemikonakli, O. 2009. Performability modelling of a Kerberos server with frequent key renewal under pseudo-secure conditions for increased security. in: 2009 International Conference on the Current Trends in Information Technology (CTIT 2009) IEEE.Book chapter
Performability modelling of handoff in wireless cellular networks and the exact solution of system models with service rates dependent on numbers of originating and handoff calls.
Ever, E., Kirsal, Y. and Gemikonakli, O. 2009. Performability modelling of handoff in wireless cellular networks and the exact solution of system models with service rates dependent on numbers of originating and handoff calls. Kunovsky, J., Hanacek, P., Zboril, F., Al-Dabass, D. and Abraham, A. (ed.) IEEE. pp. 282-287 https://doi.org/10.1109/CSSim.2009.44Conference paper
0
total views0
total downloads0
views this month0
downloads this month