Sciweavers

414 search results - page 72 / 83
» Analyzing and Designing of the Classroom Teaching System Bas...
Sort
View
MOBICOM
2009
ACM
14 years 2 months ago
SurroundSense: mobile phone localization via ambience fingerprinting
A growing number of mobile computing applications are centered around the user’s location. The notion of location is broad, ranging from physical coordinates (latitude/longitude...
Martin Azizyan, Ionut Constandache, Romit Roy Chou...
MOBIDE
2005
ACM
14 years 1 months ago
Towards universal mobile caching
In the context of mobile data access, data caching is fundamental for both performance and functionality. For this reason there have been many studies into developing energy-effi...
Ganesh Santhanakrishnan, Ahmed Amer, Panos K. Chry...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 12 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
MOBIHOC
2009
ACM
14 years 8 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
CCR
2004
151views more  CCR 2004»
13 years 7 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster