Sciweavers

2715 search results - page 207 / 543
» Network bucket testing
Sort
View
IPSN
2010
Springer
14 years 5 months ago
Slotted programming for sensor networks
We advocate a novel programming approach we call slotted programming that not only addresses the specific hardware capabilities of sensor nodes, but also facilitates coding throu...
Roland Flury, Roger Wattenhofer
AINA
2009
IEEE
14 years 5 months ago
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks
In this paper we present a low-complexity traffic prioritization strategy for video transmission using the H.264 scalable video coding (SVC) standard over 802.11e wireless networ...
Dario Gallucci, Attilio Fiandrotti, Enrico Masala,...
CSE
2009
IEEE
14 years 5 months ago
Towards Automating Social Engineering Using Social Networking Sites
—A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a...
Markus Huber, Stewart Kowalski, Marcus Nohlberg, S...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 5 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
INFOCOM
2009
IEEE
14 years 5 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...