Sciweavers

1394 search results - page 234 / 279
» On performance limitations of congestion control
Sort
View
PET
2007
Springer
14 years 2 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
SMALLTALK
2007
Springer
14 years 2 months ago
Encapsulating and exploiting change with changeboxes
Real world software systems change continuously to meet new demands. Most programming languages and development environments, however, are more concerned with limiting the effects...
Marcus Denker, Tudor Gîrba, Adrian Lienhard,...
ISM
2006
IEEE
143views Multimedia» more  ISM 2006»
14 years 2 months ago
Perceptually Enhanced Multimedia Processing, Visualization and Transmission
Data reduction has long been a method for adaptation to limited computational and network resources. But one major concern is the tradeoff between preserving visual quality and re...
Irene Cheng, Randy Goebel
RTSS
2006
IEEE
14 years 2 months ago
Modeling and Worst-Case Dimensioning of Cluster-Tree Wireless Sensor Networks
Time-sensitive Wireless Sensor Network (WSN) applications require finite delay bounds in critical situations. This paper provides a methodology for the modeling and the worst-case...
Anis Koubaa, Mário Alves, Eduardo Tovar
COLCOM
2005
IEEE
14 years 2 months ago
Location assisted routing for near-far effect mitigation in wireless networks
CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference,...
Hassan Mahmood, Cristina Comaniciu