Sciweavers

423 search results - page 81 / 85
» Design of a Password-based Authentication Method for Wireles...
Sort
View
TMC
2008
138views more  TMC 2008»
13 years 7 months ago
Airtime Fairness for IEEE 802.11 Multirate Networks
Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min through...
Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dhar...
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
13 years 11 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
INFOCOM
2011
IEEE
12 years 10 months ago
Experimental evaluation of optimal CSMA
Abstract—By ‘optimal CSMA’ we denote a promising approach to maximize throughput-based utility in wireless networks without message passing or synchronization among nodes. De...
Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi...
MOBISYS
2007
ACM
14 years 7 months ago
Surface street traffic estimation
In this paper, we propose a simple yet effective method of identifying traffic conditions on surface streets given location traces collected from on-road vehicles--this requires o...
Jungkeun Yoon, Brian Noble, Mingyan Liu