Sciweavers

2162 search results - page 307 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 4 months ago
On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment
—In this paper, a binary hypothesis distributed detection problem in correlated wireless sensor networks with cooperative relays deployment is considered. In particular, the effe...
Mohammed W. Baidas, Ahmed S. Ibrahim, Karim G. Sed...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 4 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 4 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 4 months ago
On Channel State Inference and Prediction Using Observable Variables in 802.11b Network
—Performance of cross-layer protocols that recommend the relay of corrupted packets to higher layers can be improved significantly by accurately inferring/predicting the bit erro...
Shirish S. Karande, Syed A. Khayam, Yongju Cho, Ki...
IWSOS
2007
Springer
15 years 4 months ago
Mercator: Self-organizing Geographic Connectivity Maps for Scalable Ad-Hoc Routing
Abstract. A fundamental problem of future networks is to get fully selforganized routing protocols with good scalability properties that produce good paths in a wide range of netwo...
Luis A. Hernando, Unai Arronategui