Sciweavers

5324 search results - page 835 / 1065
» Internet Security Protocols
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
On the Use of Concurrent Multipath Transfer over Asymmetric Paths
Abstract--With the deployment of more and more resiliencecritical Internet applications, there is a rising demand for multihomed network sites. This leads to the desire for simulta...
Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, ...
SIGDIAL
2010
13 years 7 months ago
YouBot: A Simple Framework for Building Virtual Networking Agents
This paper proposes a simple framework for building 'virtual networking agents'; programs that can communicate with users and collect information through the internet. T...
Seiji Takegata, Kumiko Tanaka-Ishii
TMC
2012
12 years 1 days ago
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks
—This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative r...
Wanqing Tu, Cormac J. Sreenan, Chun Tung Chou, Arc...
ICBA
2004
Springer
198views Biometrics» more  ICBA 2004»
14 years 3 months ago
Face Authentication Competition on the BANCA Database
Abstract. This paper details the results of a face verification competition [2] held in conjunction with the First International Conference on Biometric Authentication. The contes...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
WISEC
2010
ACM
14 years 4 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...