scispace - formally typeset
Search or ask a question
Institution

Philips

CompanyVantaa, Finland
About: Philips is a company organization based out in Vantaa, Finland. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 68260 authors who have published 99663 publications receiving 1882329 citations. The organization is also known as: Koninklijke Philips Electronics N.V. & Royal Philips Electronics.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a lattice Boltzmann model for simulating fluids with multiple components and interparticle forces is described in detail, and the mutual diffusivity in a binary mixture is calculated analytically and confirment by numerical simulation.
Abstract: A lattice Boltzmann model for simulating fluids with multiple components and interparticle forces proposed by Shan and Chen is described in detail. Macroscopic equations governing the motion of each component are derived by using the Chapman-Enskog method. The mutual diffusivity in a binary mixture is calculated analytically and confirment by numerical simulation. The diffusivity is generally a function of the concentrations of the two components but independent of the fluid velocity, so that the diffusion is Galilean invariant. The analytically calculated shear kinematic viscosity of this model is also confiremoed numerically.

464 citations

Proceedings ArticleDOI
11 May 2003
TL;DR: A novel link adaptation algorithm is presented, which aims to improve the system throughput by adapting the transmission rate to the current link condition and it is shown that the proposed algorithm closely approximates the ideal case with the perfect knowledge about the channel and receiver conditions.
Abstract: IEEE 802.11 wireless local area network (WLAN) physical layers (PHYs) support multiple transmission rates. The PHY rate to be used for a particular frame transmission is solely determined by the transmitting station. The transmitting rate should be chosen in an adaptive manner since the wireless channel condition varies over time due to such factors as station mobility, time-varying interference, and location-dependent errors. In this paper, we present a novel link adaptation algorithm, which aims to improve the system throughput by adapting the transmission rate to the current link condition. Our algorithm is simply based on the received signal strength measured from the received frames, and hence it does not require any changes in the current IEEE 802.11 WLAN medium access control (MAC) protocol. Based on the simulation and its comparison with a numerical analysis, it is shown that the proposed algorithm closely approximates the ideal case with the perfect knowledge about the channel and receiver conditions.

462 citations

Book ChapterDOI
10 Oct 2006
TL;DR: An implementation of read-proof hardware that is resistant against invasive attacks is developed and experimental evidence is given that an invasive attack on an IC equipped with this coating, reveals only a small amount of information on the key.
Abstract: In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because attackers have access to many physical means that enable them to derive information on the secret keys. In order to limit the attacker’s ability to read out secret information, the concept of Algorithmic Tamper Proof (ATP) security is needed as put forth by Gennaro, Lysyanskaya, Malkin, Micali and Rabin. An essential component to achieve ATP security is read-proof hardware. In this paper, we develop an implementation of read-proof hardware that is resistant against invasive attacks. The construction is based on a hardware and a cryptographic part. The hardware consists of a protective coating that contains a lot of randomness. By performing measurements on the coating a fingerprint is derived. The cryptographic part consists of a Fuzzy Extractor that turns this fingerprint into a secure key. Hence no key is present in the non-volatile memory of the device. It is only constructed at the time when needed, and deleted afterwards. A practical implementation of the hardware and the cryptographic part is given. Finally, experimental evidence is given that an invasive attack on an IC equipped with this coating, reveals only a small amount of information on the key.

461 citations

Journal ArticleDOI
TL;DR: It is demonstrated that an integer number of electrons pass through the quantum dot each rf cycle, at integer multiples of ef, where f is the rf frequency.
Abstract: We have observed a quantized current in a lateral quantum dot, defined by metal gates in the two-dimensional electron gas (2DEG) of a GaAs/AlGaAs heterostructure. By modulating the tunnel barriers in the 2DEG with two phase-shifted rf signals, and employing the Coulomb blockade of electron tunneling, we produced quantized current plateaus in the current-voltage characteristics at integer multiples of ef, where f is the rf frequency. This demonstrates that an integer number of electrons pass through the quantum dot each rf cycle.

460 citations

Journal ArticleDOI
Stefan Mangold1, Sunghyun Choi, Guido R. Hiertz, O. Klein, Bernhard Walke 
TL;DR: The new hybrid coordination function of the IEEE 802.11e with its contention-based and contention-free (controlled) medium access control schemes is evaluated and the capability to provide QoS support is discussed by means of simulations.
Abstract: The IEEE 802.11e medium access control protocol is an emerging standard for wireless local area networks providing quality of service. An overview of this standard based on the current draft is presented on this article. We analyze the enhancements in 802.11 standard. The new hybrid coordination function of the IEEE 802.11e with its contention-based and contention-free (controlled) medium access control schemes is evaluated. The capability to provide QoS support is discussed by means of simulations.

460 citations


Authors

Showing all 68268 results

NameH-indexPapersCitations
Mark Raymond Adams1471187135038
Dario R. Alessi13635474753
Mohammad Khaja Nazeeruddin12964685630
Sanjay Kumar120205282620
Mark W. Dewhirst11679757525
Carl G. Figdor11656652145
Mathias Fink11690051759
David B. Solit11446952340
Giulio Tononi11451158519
Jie Wu112153756708
Claire M. Fraser10835276292
Michael F. Berger10754052426
Nikolaus Schultz106297120240
Rolf Müller10490550027
Warren J. Manning10260638781
Network Information
Related Institutions (5)
Katholieke Universiteit Leuven
176.5K papers, 6.2M citations

91% related

Georgia Institute of Technology
119K papers, 4.6M citations

88% related

Stanford University
320.3K papers, 21.8M citations

88% related

National University of Singapore
165.4K papers, 5.4M citations

88% related

IBM
253.9K papers, 7.4M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20235
202239
2021898
20201,428
20191,665
20181,378