Sciweavers

3793 search results - page 707 / 759
» The wireless synchronization problem
Sort
View
CCN
2006
278views Communications» more  CCN 2006»
13 years 9 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
DMIN
2006
122views Data Mining» more  DMIN 2006»
13 years 9 months ago
Cost-Sensitive Analysis in Multiple Time Series Prediction
- In this paper we propose a new methodology for Cost-Benefit analysis in a multiple time series prediction problem. The proposed model is evaluated in a real world application bas...
Chamila Walgampaya, Mehmed M. Kantardzic
LISA
2003
13 years 9 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
IC
2000
13 years 9 months ago
Tree Delta Transcoding for Efficient Dynamic Resource Delivery on Asymmetric Internet
The paper presents a scheme for serving dynamic resources over the Internet. The method uses a combination of structured fragmentation of dynamic resources in a tree hierarchy and...
Javed I. Khan
MASCOTS
1998
13 years 9 months ago
IPB: An Internet Protocol Benchmark using Simulated Traffic
A common shortcoming of many network measurement programs is that their metrics are not expressed in terms directly applicable to applications and users. To address this problem, ...
Bruce A. Mah, Peter E. Sholander, Luis Martinez, L...