Sciweavers

403 search results - page 79 / 81
» Bits through ARQs
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
USS
2010
13 years 5 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
WISEC
2010
ACM
14 years 6 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
BMCBI
2010
185views more  BMCBI 2010»
13 years 2 months ago
MetaPIGA v2.0: maximum likelihood large phylogeny estimation using the metapopulation genetic algorithm and other stochastic heu
Background: The development, in the last decade, of stochastic heuristics implemented in robust application softwares has made large phylogeny inference a key step in most compara...
Raphaël Helaers, Michel C. Milinkovitch
TIT
2010
156views Education» more  TIT 2010»
13 years 2 months ago
Bandwidth and power allocation for cooperative strategies in Gaussian relay networks
Abstract-- In a relay network with a single sourcedestination pair, we examine the achievable rates with amplifyand-forward (AF) relaying strategy. Motivated by applications in sen...
Ivana Maric, Roy D. Yates