Sciweavers

1875 search results - page 348 / 375
» Automatic Network Protocol Analysis
Sort
View
JSAC
2011
115views more  JSAC 2011»
13 years 3 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
WWW
2001
ACM
14 years 9 months ago
N for the price of 1: bundling web objects for more efficient content delivery
: Persistent connections address inefficiencies associated with multiple concurrent connections. They can improve response time when successfully used with pipelining to retrieve a...
Craig E. Wills, Mikhail Mikhailov, Hao Shang
VTC
2007
IEEE
14 years 3 months ago
Opportunistic Relay Selection with Limited Feedback
Abstract— It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless net...
Caleb K. Lo, Robert W. Heath Jr., Sriram Vishwanat...
ESORICS
2007
Springer
14 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
STACS
2007
Springer
14 years 2 months ago
Broadcasting vs. Mixing and Information Dissemination on Cayley Graphs
One frequently studied problem in the context of information dissemination in communication networks is the broadcasting problem. In this paper, we study the following randomized b...
Robert Elsässer, Thomas Sauerwald