Sciweavers

1534 search results - page 280 / 307
» networks 2011
Sort
View
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 7 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
ICC
2011
IEEE
202views Communications» more  ICC 2011»
12 years 7 months ago
Outage Probability Analysis for Collocated Spectrum-Sharing Macrocell and Femtocells
—Femtocells have been considered by the wireless industry as a promising solution not only to improve indoor coverage, but also to unload traffic from already overburdened macroc...
Xiaoli Chu, Joyce Y. Wu, Haibo Wang
ICC
2011
IEEE
199views Communications» more  ICC 2011»
12 years 7 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu
ICDAR
2011
IEEE
12 years 7 months ago
Co-training for Handwritten Word Recognition
—To cope with the tremendous variations of writing styles encountered between different individuals, unconstrained automatic handwriting recognition systems need to be trained on...
Volkmar Frinken, Andreas Fischer, Horst Bunke, Ali...
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 2 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...