Sciweavers

267 search results - page 52 / 54
» Experience with control mechanisms for packet video in the i...
Sort
View
SIGCOMM
2003
ACM
14 years 1 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
14 years 2 months ago
A humanoid upper body system for two-handed manipulation
— This video presents a humanoid two-arm system developed as a research platform for studying dexterous twohanded manipulation. The system is based on the modular DLR-Lightweight...
Christoph Borst, Christian Ott, Thomas Wimböc...
MOBIHOC
2007
ACM
14 years 8 months ago
On exploiting asymmetric wireless links via one-way estimation
A substantial percentage of links in wireless networks, especially low-power ones, is asymmetric. For the low-quality direction of asymmetric links, we observe based on testbed ex...
Lifeng Sang, Anish Arora, Hongwei Zhang
CONEXT
2009
ACM
13 years 9 months ago
EZ-Flow: removing turbulence in IEEE 802.11 wireless mesh networks without message passing
Recent analytical and experimental work demonstrate that IEEE 802.11-based wireless mesh networks are prone to turbulence. Manifestations of such turbulence take the form of large...
Adel Aziz, David Starobinski, Patrick Thiran, Alae...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 7 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent