Sciweavers

1503 search results - page 226 / 301
» Device Independence and the Web
Sort
View
ICDCSW
2005
IEEE
14 years 2 months ago
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming
The widespread popularity of roaming wireless devices with limited and heterogeneous capabilities is enabling new challenging deployment scenarios for multimedia streaming in wire...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
ICPADS
2005
IEEE
14 years 2 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
ACII
2005
Springer
14 years 2 months ago
An Ontology for Description of Emotional Cues
There is a great variety of theoretical models of emotions and implementation technologies which can be used in the design of affective computers. Consequently, designers and resea...
Zeljko Obrenovic, Nestor Garay, Juan Miguel L&oacu...
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
14 years 2 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
CCS
2005
ACM
14 years 2 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...