Sciweavers

19 search results - page 2 / 4
» Experimental Results of Covert Channel Limitation in One-Way...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
GLOBECOM
2008
IEEE
14 years 1 months ago
Throughput/Delay Measurements of Limited Feedback Beamforming in Indoor Wireless Networks
—This paper investigates the tradeoff between throughput and feedback delay of limited feedback beamforming in indoor wireless channels with a practical MIMO-OFDM prototype. Past...
Robert C. Daniels, Ketan Mandke, Kien T. Truong, S...
TROB
2002
132views more  TROB 2002»
13 years 7 months ago
Performance of a distributed robotic system using shared communications channels
We have designed and built a set of miniature robots called Scouts and have developed a distributed software system to control them. This paper addresses the fundamental choices we...
Paul E. Rybski, Sascha Stoeter, Maria L. Gini, Dea...
INFOCOM
2009
IEEE
14 years 2 months ago
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...