Sciweavers

20 search results - page 3 / 4
» Investigating Functional and Code Size Measures for Mobile A...
Sort
View
TRIDENTCOM
2006
IEEE
13 years 11 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
IOT
2010
13 years 2 months ago
Evaluation of 1D barcode scanning on mobile phones
Abstract--1D or linear barcodes are the black-and-whitestriped codes that can be found on most consumer products. This work evaluates existing 1D barcode scanners for mobile phones...
Felix von Reischach, Stephan Karpischek, Florian M...
TIT
2010
170views Education» more  TIT 2010»
13 years 10 days ago
Correcting charge-constrained errors in the rank-modulation scheme
We investigate error-correcting codes for a the rank-modulation scheme with an application to flash memory devices. In this scheme, a set of n cells stores information in the permu...
Anxiao Jiang, Moshe Schwartz, Jehoshua Bruck
PDPTA
2003
13 years 7 months ago
Managing Flocking Objects with an Octree Spanning a Parallel Message-Passing Computer Cluster
We investigate the management of flocking mobile objects using a parallel message-passing computer cluster. An octree, a data structure well-known for use in managing a 3D space, ...
Thomas E. Portegys, Kevin M. Greenan
INFOCOM
2005
IEEE
13 years 11 months ago
Improved single-round protocols for remote file synchronization
— Given two versions of a file, a current version located on one machine and an outdated version known only to another machine, the remote file synchronization problem is how t...
Utku Irmak, Svilen Mihaylov, Torsten Suel