Sciweavers

658 search results - page 121 / 132
» On the Connectivity of Key-Distribution Strategies in Wirele...
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
GLOBECOM
2010
IEEE
13 years 5 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
MM
2003
ACM
105views Multimedia» more  MM 2003»
14 years 1 months ago
Universal synchronization scheme for distributed audio-video capture on heterogeneous computing platforms
We propose a universal synchronization scheme for distributed audio-video capture on heterogeneous computing devices such as laptops, tablets, PDAs, cellular phones, audio recorde...
Rainer Lienhart, Igor Kozintsev, Stefan Wehr
INFOCOM
2009
IEEE
14 years 2 months ago
Extreme Value FEC for Wireless Data Broadcasting
Abstract—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting ...
Weiyao Xiao, David Starobinski
PDP
2003
IEEE
14 years 1 months ago
QoS-aware Accounting in Mobile Computing Scenarios
The enlarging market of portable devices and wireless networks stimulates the provisioning of mobilityenabled Internet services with differentiated levels of Quality of Service (Q...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi