Sciweavers

646 search results - page 128 / 130
» A Spatially Dependent Communication Model for Ubiquitous Sys...
Sort
View
CCS
2009
ACM
13 years 11 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
MINENET
2006
ACM
14 years 1 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
NOSSDAV
2005
Springer
14 years 17 days ago
Real-time monitoring of video quality in IP networks
This paper investigates the problem of assessing the quality of video transmitted over IP networks. Our goal is to develop a methodology that is both reasonably accurate and simpl...
Shu Tao, John G. Apostolopoulos, Roch Guéri...
ISHPC
2000
Springer
13 years 10 months ago
Leveraging Transparent Data Distribution in OpenMP via User-Level Dynamic Page Migration
This paper describes transparent mechanisms for emulating some of the data distribution facilities offered by traditional data-parallel programming models, such as High Performance...
Dimitrios S. Nikolopoulos, Theodore S. Papatheodor...
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 2 months ago
Fairness issues in a chain of IEEE 802.11 stations
: We study a simple general scenario of ad hoc networks based on IEEE 802.11 wireless communications, consisting in a chain of transmitters, each of them being in the carrier sense...
Bertrand Ducourthial, Yacine Khaled, Stépha...