Sciweavers

47 search results - page 7 / 10
» aina 2010
Sort
View
AINA
2010
IEEE
13 years 6 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
AINA
2010
IEEE
14 years 16 days ago
Testing Cross-Platform Streaming of Video Games over Wired and Wireless LANs
—In this paper we present a new cross-platform approach for video game delivery in wired and wireless local networks. The developed 3D streaming and video streaming approaches en...
Audrius Jurgelionis, Francesco Bellotti, Alessandr...
AINA
2010
IEEE
14 years 16 days ago
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks
—Conventional broadcasting protocols suffer from network congestion, frequent message losses and corruption of broadcast messages due to a vast number of duplicate packets transm...
Subrata Saha, Syed Rafiul Hussain, A. K. M. Ashiku...
AINA
2010
IEEE
14 years 16 days ago
Routing Loops in DAG-Based Low Power and Lossy Networks
Abstract—Directed Acyclic Graphs (DAGs), rooted at popular/default destinations, have emerged as a preferred mechanism to provide IPv6 routing functionality in large scale low po...
Weigao Xie, Mukul Goyal, Hossein Hosseini, Jerald ...
AINA
2010
IEEE
13 years 11 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores