Sciweavers

26 search results - page 3 / 6
» A Measurement Study of Scheduler-Based Attacks in 3G Wireles...
Sort
View
ICASSP
2007
IEEE
13 years 11 months ago
Subjective Quality Evaluation of Decoded Video in the Presence of Packet Losses
This paper investigates the perceptual quality of decoded video bitstreams after packet losses. We focus on lowresolution and low-bit rate video coded by the H.264/AVC encoder, an...
Tao Liu, Yao Wang, Jill M. Boyce, Zhenyu Wu, Hua Y...
IJWIN
2002
154views more  IJWIN 2002»
13 years 5 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
SIGCOMM
2010
ACM
13 years 5 months ago
Mobile data offloading: how much can WiFi deliver?
This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from a metropolitan area and collected stat...
Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, S...
WS
2005
ACM
13 years 11 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
WISEC
2010
ACM
14 years 12 days ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...