Sciweavers

9 search results - page 2 / 2
» Evaluation of Evidence in Internet Auction Fraud Investigati...
Sort
View
JDFP
2006
109views more  JDFP 2006»
13 years 4 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
PAM
2011
Springer
12 years 7 months ago
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...
WCE
2007
13 years 5 months ago
A Performance Based Evaluation of SIP Signalling across Converged Networks
—As wireless networks evolves towards the 3G and 4G architectures the mobile core networks provides a platform for all-IP convergence of mobile and fixed networks allowing for be...
Adetola Oredope, Antonio Liotta
CORR
2006
Springer
107views Education» more  CORR 2006»
13 years 4 months ago
Optimal Scheduling of Peer-to-Peer File Dissemination
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Intern...
Jochen Mundinger, Richard R. Weber, Gideon Weiss