Sciweavers

COMSWARE
2008
IEEE
14 years 6 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
COMSWARE
2008
IEEE
14 years 6 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain
COMSWARE
2008
IEEE
14 years 6 months ago
Community based search on power law networks
—In this paper, we have presented a novel algorithm for searching Peer-to-Peer (P2P) networks which forms power law topology. It is completely decentralized in nature and hence i...
Tathagata Das, Subrata Nandi, Niloy Ganguly
COMSWARE
2008
IEEE
14 years 6 months ago
Multicast instant channel change in IPTV systems
Damodar Banodkar, K. K. Ramakrishnan, Shivkumar Ka...
COMSWARE
2008
IEEE
14 years 6 months ago
Network coding for TCP throughput enhancement over a multi-hop wireless network
—The poor performance of TCP over multi-hop wireless networks is well known. In this paper we explore to what extent network coding can help to improve the throughput performance...
P. Samuel David, Anurag Kumar
COMSWARE
2008
IEEE
14 years 6 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
COMSWARE
2008
IEEE
14 years 6 months ago
On TCP-aware uplink scheduling in IEEE 802.16 networks
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
Hemant Kumar Rath, Abhay Karandikar
COMSWARE
2008
IEEE
14 years 6 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
VRST
2009
ACM
14 years 6 months ago
Gaze behavior and visual attention model when turning in virtual environments
In this paper we analyze and try to predict the gaze behavior of users navigating in virtual environments. We focus on first-person navigation in virtual environments which invol...
Sébastien Hillaire, Anatole Lécuyer,...
VRST
2009
ACM
14 years 6 months ago
Wearable imaging system for capturing omnidirectional movies from a first-person perspective
We propose a novel wearable imaging system that can capture omnidirectional movies from the viewpoint of the camera wearer. The imaging system solves the problems of resolution un...
Kazuaki Kondo, Yasuhiro Mukaigawa, Yasushi Yagi