Sciweavers

430 search results - page 17 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
BMCBI
2010
89views more  BMCBI 2010»
13 years 8 months ago
Semi-automatic identification of punching areas for tissue microarray building: the tubular breast cancer pilot study
Background: Tissue MicroArray technology aims to perform immunohistochemical staining on hundreds of different tissue samples simultaneously. It allows faster analysis, considerab...
Federica Viti, Ivan Merelli, Mieke Timmermans, Mic...
ISCC
2006
IEEE
14 years 2 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
GLOBECOM
2010
IEEE
13 years 6 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
FTDCS
2004
IEEE
13 years 11 months ago
A Distributed Buffer Management Approach Supporting IPv6 Mobility
In wireless local area networks (WLANs), mobility support is essential for providing seamless services. The current Mobile IP standard suffers several problems, especially for acc...
Yu-Hung Liu, Yaw-Chung Chen
INFOCOM
2011
IEEE
12 years 11 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...