Sciweavers

11588 search results - page 81 / 2318
» Will They Like This
Sort
View
ICMCS
2005
IEEE
97views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Wireless Broadcasting Using the Scalable Extension of H.264/AVC
For the ongoing standardization activities for IP-based broadcast video and audio streaming services over DVBH, DMB or 3GPP’s MBMS the use of new forward error protection techni...
Thomas Schierl, Heiko Schwarz, Detlev Marpe, Thoma...
WETICE
2005
IEEE
14 years 3 months ago
Host Behaviour Based Early Detection of Worm Outbreaks in Internet Backbones
We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual...
Thomas Dübendorfer, Bernhard Plattner
SIGITE
2005
ACM
14 years 3 months ago
Hands-on approach to teaching computer networking using packet traces
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
Jeanna Neefe Matthews
WS
2005
ACM
14 years 3 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
ICALP
2005
Springer
14 years 3 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin