Sciweavers

3233 search results - page 477 / 647
» Probabilistic Data Exchange
Sort
View
ICCCN
2008
IEEE
14 years 2 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
IEEEIAS
2008
IEEE
14 years 2 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
PIMRC
2008
IEEE
14 years 2 months ago
Downlink overhead reduction for Multi-Cell Cooperative Processing enabled wireless networks
—Multi-cell Cooperative Processing (MCP) has been recognised as an efficient technique for increasing spectral efficiency of future cellular systems. However the provided bene...
Agisilaos Papadogiannis, Hans Jørgen Bang, ...
SIPS
2008
IEEE
14 years 2 months ago
Efficient mapping of advanced signal processing algorithms on multi-processor architectures
Modern microprocessor technology is migrating from simply increasing clock speeds on a single processor to placing multiple processors on a die to increase throughput and power pe...
Bhavana B. Manjunath, Aaron S. Williams, Chaitali ...
WCNC
2008
IEEE
14 years 2 months ago
Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks
—With the rapid growth of WLAN capability for mobile devices such as laptops, handhelds, mobile phones and vehicles, we will witness WLANs with very large numbers of active nodes...
Bogdan Roman, Frank Stajano, Ian J. Wassell, David...