Sciweavers

3152 search results - page 580 / 631
» Robust Computer Vision for Computer Mediated Communication
Sort
View
INFOCOM
2009
IEEE
15 years 9 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
SIGCOMM
2009
ACM
15 years 9 months ago
Cross-layer wireless bit rate adaptation
This paper presents SoftRate, a wireless bit rate adaptation protocol that is responsive to rapidly varying channel conditions. Unlike previous work that uses either frame recepti...
Mythili Vutukuru, Hari Balakrishnan, Kyle Jamieson
108
Voted
MOBICOM
2005
ACM
15 years 8 months ago
Architecture and evaluation of an unplanned 802.11b mesh network
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
SIGCOMM
2010
ACM
15 years 2 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
MOBICOM
2009
ACM
15 years 9 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...