Sciweavers

4004 search results - page 65 / 801
» How Many Packets Can We Encode
Sort
View
MSWIM
2004
ACM
15 years 8 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
ICNS
2007
IEEE
15 years 8 months ago
Real-time anonymization in passive network monitoring
Abstract—Passive network monitoring that observes user traffic has many advantages over active monitoring that uses test packets. It can provide characteristics of real user tra...
Sven Ubik, Petr Zejdl, Jiri Halak
JSW
2007
116views more  JSW 2007»
15 years 2 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
SIGMETRICS
1998
ACM
15 years 6 months ago
Predicting MPEG Execution Times
This paper reports on a set of experiments that measure the amount of CPU processing needed to decode MPEGcompressed video in software. These experiments were designed to discover...
Andy C. Bavier, Allen Brady Montz, Larry L. Peters...