Sciweavers

634 search results - page 73 / 127
» Some observations on bitTorrent performance
Sort
View
SP
2008
IEEE
110views Security Privacy» more  SP 2008»
14 years 2 months ago
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
Despite the rapid adoption of Voice over IP (VoIP), its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be enc...
Charles V. Wright, Lucas Ballard, Scott E. Coull, ...
VTC
2008
IEEE
185views Communications» more  VTC 2008»
14 years 2 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
ICC
2007
IEEE
14 years 2 months ago
On the Verification of the Gravity Model Used for Mobility Modeling
— Gravity model used to model transport flow has proven invaluable in urban planning. Some recent work has proposed to use gravity model to predict user movements in cellular net...
Yong Huat Chew, Shinobu Nanba, Peng Keong Tham, Bo...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
14 years 2 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
ICRA
2007
IEEE
126views Robotics» more  ICRA 2007»
14 years 2 months ago
Flying Fast and Low Among Obstacles
— Safe autonomous flight is essential for widespread acceptance of aircraft that must fly close to the ground. We have developed a method of collision avoidance that can be use...
Sebastian Scherer, Sanjiv Singh, Lyle Chamberlain,...