The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network-connected embedded systems require multiple lines of defense against malware. In addition to preventing malware by designing secure interfaces and software, anomaly-based detection is needed to detect malware that successfully infiltrates these defenses. Timing based anomaly detection strengthens embedded system security by detecting anomalies in the execution time of critical software tasks...
Recent research has demonstrated that many systems are vulnerable to numerous types of malicious activity. As the pervasiveness of embedded systems with network connectivity continues to increase, embedded systems security has become a critical challenge. However, most existing techniques for detecting malware utilize software-based methods that incur significant performance overheads that are often...
Due to high data rate requirement for indoor communication, femtocells have been proposed as a potential solution to increase not only indoor radio coverage but also system capacity. However, there is co-channel interference that affects the system throughput seriously due to high density of femtocells in urban environment. In this paper, an adaptive frequency allocation (AFA) for LTE network is proposed...
Uplink Inter-Cell Interference (ICI) and interference fluctuation degrades the uplink throughput of LTE/LTE-Advanced systems seriously. To deal with these problems, a coordinated scheduling method with resource sorting is proposed. In the proposed method, the uplink interference fluctuation is resisted by exploiting resource sorting and limiting the ICI generated by a given user to a predefined range...
Joint User and Antenna Selection (JUAS) with global optimal solution for multi-cell Multi-User Multiple Input Multiple Output (MU-MIMO) systems needs the centralized processing and full Channel State Information (CSI) sharing that both require high capacity backhaul links. In this paper, decentralized JUAS algorithm is considered for multi-cell MU-MIMO systems with Block Diagonalization (BD) precoding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.