Sciweavers

2478 search results - page 109 / 496
» Message from the Chair
Sort
View
ESORICS
2002
Springer
16 years 4 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe
DCC
2007
IEEE
16 years 4 months ago
Bit Recycling with Prefix Codes
Many data compression methods cannot remove all redundancy from a file that they compress because it can be encoded to many compressed files. In particular, we consider the redund...
Danny Dubé, Vincent Beaudoin
GLOBECOM
2006
IEEE
15 years 10 months ago
Optimal Codeword Design for Precoded UWB (PUWB) Systems
Abstract— A precoding technique applied to symbols transmitted in an ultra-wideband (UWB) system was proposed in [1], which can concentrate the signal power at the receiver to fa...
Yu-Hao Chang, Shang-Ho Tsai, Xiaoli Yu, C. C. Jay ...
IWNAS
2006
IEEE
15 years 10 months ago
A Fast Read/Write Process to Reduce RDMA Communication Latency
RDMA reduces network latency by eliminating unnecessary copies from network interface cards to application buffers, but how to reduce memory registration cost is a challenge. Prev...
Li Ou, Jizhong Han
144
Voted
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song