Sciweavers

6199 search results - page 1219 / 1240
» Monitoring the
Sort
View
USS
2010
13 years 6 months ago
Chipping Away at Censorship Firewalls with User-Generated Content
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
USS
2010
13 years 6 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
DCOSS
2009
Springer
13 years 6 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
IC3
2009
13 years 6 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
ICC
2009
IEEE
136views Communications» more  ICC 2009»
13 years 6 months ago
Performance of VoIP with DCCP for Satellite Links
Abstract--We present experimental results for the performance of selected voice codecs using the Datagram Congestion Control Protocol (DCCP) with TCP-Friendly Rate Control (TFRC) c...
Golam Sarwar, Roksana Boreli, Emmanuel Lochin
« Prev « First page 1219 / 1240 Last » Next »