Sciweavers

1674 search results - page 318 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 2 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
14 years 2 months ago
Segmentation and Recognition of Tabla Strokes
A system that segments and labels tabla strokes from real performances is described. Performance is evaluated on a large database taken from three performers under different recor...
Parag Chordia
ISPA
2005
Springer
14 years 2 months ago
FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems
Abstract. The viability of overlay multicasting has been established by prev ious research. However, in order to apply overlay multicast to Internet -scale distributed systems, suc...
Yijun Lu, Hong Jiang, Dan Feng
PAM
2005
Springer
14 years 2 months ago
A Merged Inline Measurement Method for Capacity and Available Bandwidth
— We have proposed a new TCP version, called ImTCP (Inline measurement TCP), in [1]. The ImTCP sender adjusts the transmission intervals of data packets, and then utilizes the ar...
Cao Le Thanh Man, Go Hasegawa, Masayuki Murata