108 research outputs found

    04/15/1985 - Weekly Preview Review

    Get PDF
    Conventional RFID readers combine transmission (to the tag) and reception (from the tag) functions in a single physical device. In this paper we discuss the design and potential applications of a receive-only device, called "RFID listener", that decodes the signals from both the tag and the reader. This enables augmented RFID systems where one transmitter coexists with multiple listeners offering reception redundancy and diversity. We present a Software-Defined Radio (SDR) implementation of an RFID listener compliant with Gen2 standard, which can serve as a research tool for experimenting "on air" novel augmented RFID systems. Moreover, our listener can be used as a flexible and cheap protocol analyzer for conventional reader/tag systems. We present a test-bed setting where our listener and a conventional SDR reader are used in conjunction to measure separately the maximum downlink and uplink range. © 2011 IEEE

    On integrating a proprietary and a commercial architecture for optimal BIST performances in SoCs

    Get PDF
    This paper presents the integration of a proprietary hierarchical and distributed test access mechanism called HD2BIST and a BIST insertion commercial tool. The paper briefly describes the architecture and the features of both the environments and it presents some experimental results obtained on an industrial So

    HD2BIST: a hierarchical framework for BIST scheduling, data patterns delivering and diagnosis in SoCs

    Get PDF
    Proposes HD2BIST, a complete hierarchical framework for BIST scheduling, data patterns delivering, and diagnosis of a complex system including embedded cores with different test requirements as full scan cores, partial scan cores, or BIST-ready cores. The main goal of HD2BIST is to maximize and simplify the reuse of the built-in test architectures, giving the chip designer the highest flexibility in planning the overall SoC test strategy. HD2BIST defines a test access method able to provide a direct “virtual” access to each core of the system, and can be conceptually considered as a powerful complement to the P1500 standard, whose main target is to make the test interface of each core independent from the vendo

    Mobile network anomaly detection and mitigation: The NEMESYS approach

    Get PDF
    Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and eliminate or mitigate their effects, as part of the EU FP7 NEMESYS project. These ideas are supplemented with a careful review of the state-of-the-art regarding anomaly detection techniques that mobile network operators may use to protect their infrastructure and secure users against malware

    Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks

    Get PDF
    A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust communications during the emergency response operations are of paramount importance. Nevertheless, various reports have highlighted that after many devastating events, the current technologies used, failed to support the mission critical communications, resulting in further loss of lives. Inefficiencies of the current communications used for emergency response include lack of technology inter-operability between different jurisdictions, and high vulnerability due to their centralized infrastructure. In this article, we propose a flexible network architecture that provides a common networking platform for heterogeneous multi-operator networks, for interoperation in case of emergencies. A wireless mesh network is the main part of the proposed architecture and this provides a back-up network in case of emergencies. We first describe the shortcomings and limitations of the current technologies, and then we address issues related to the applications and functionalities a future emergency response network should support. Furthermore, we describe the necessary requirements for a flexible, secure, robust, and QoS-aware emergency response multi-operator architecture, and then we suggest several schemes that can be adopted by our proposed architecture to meet those requirements. In addition, we suggest several methods for the re-tasking of communication means owned by independent individuals to provide support during emergencies. In order to investigate the feasibility of multimedia transmission over a wireless mesh network, we measured the performance of a video streaming application in a real wireless metropolitan multi-radio mesh network, showing that the mesh network can meet the requirements for high quality video transmissions

    COST Action IC0703 “Data Traffic Monitoring and Analysis (TMA): theory, techniques, tools and applications for the future networks”

    No full text
    The COST Action IC0703 “Data Traffic Monitoring and Analysis (TMA): theory, techniques, tools and applications for the future networks” was started on March 2008, with a planned duration of 4 years. It is part of the COST programme (ICT domain) which is now run by the European Science Foundation. The Action involves about 80 participants from 22 member countries (see http://w3.cost.esf.org/index.php?id=110&action_number=IC0703
    • …
    corecore