Sciweavers

2421 search results - page 407 / 485
» Approximate Flow-Aware Networking
Sort
View
WWW
2008
ACM
14 years 8 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
PERCOM
2008
ACM
14 years 7 months ago
Location Fingerprint Analyses Toward Efficient Indoor Positioning
Abstract--Analytical models to evaluate and predict "precision" performance of indoor positioning systems based on location fingerprinting are lacking. Such models can be...
Nattapong Swangmuang, Prashant Krishnamurthy
PERCOM
2006
ACM
14 years 7 months ago
Maximum Weighted Matching with Interference Constraints
In this paper, we study the problem of utility maximization in multi-hop wireless systems. To study the effect of wireless interference constraints on the utility maximization pro...
Gaurav Sharma, Ness B. Shroff, Ravi R. Mazumdar
DSN
2009
IEEE
14 years 2 months ago
Fluid modeling and control for server system performance and availability
Although server technology provides a means to support a wide range of online services and applications, their ad-hoc configuration poses significant challenges to the performan...
Luc Malrait, Sara Bouchenak, Nicolas Marchand
GLOBECOM
2009
IEEE
14 years 2 months ago
On the Performance Gains of VoIP Aggregation and ROHC over a WirelessMAN-OFDMA Air Interface
—A growing number of mobile WiMAX deployments are in progress world-wide and the technology is anticipated to play a key role in next generation mobile broadband wireless network...
Jarno Pinola, Esa Piri, Kostas Pentikousis