Sciweavers

4418 search results - page 872 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
MOBIHOC
2003
ACM
15 years 11 months ago
On the capacity improvement of ad hoc wireless networks using directional antennas
The capacity of ad hoc wireless networks is constrained by the interference between concurrent transmissions from neighboring nodes. Gupta and Kumar have shown that the capacity o...
Su Yi, Yong Pei, Shivkumar Kalyanaraman
CCS
2009
ACM
15 years 6 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
NDSS
2009
IEEE
15 years 6 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson
ICSM
2007
IEEE
15 years 6 months ago
A Maintainable Software Architecture for Fast and Modular Bioinformatics Sequence Search
Bioinformaticists use the Basic Local Alignment Search Tool (BLAST) to characterize an unknown sequence by comparing it against a database of known sequences, thus detecting evolu...
Jeremy S. Archuleta, Eli Tilevich, Wu-chun Feng
ETRA
2006
ACM
198views Biometrics» more  ETRA 2006»
15 years 5 months ago
Perceptual attention focus prediction for multiple viewers in case of multimedia perceptual compression with feedback delay
Human eyes have limited perception capabilities. Only 2 degrees of our 180 degree vision field provide the highest quality of perception. Due to this fact the idea of perceptual a...
Oleg Komogortsev, Javed I. Khan