Sciweavers

981 search results - page 120 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
WISA
2009
Springer
15 years 6 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
15 years 5 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
INFOCOM
2003
IEEE
15 years 4 months ago
Capacity, Delay and Mobility in Wireless Ad-Hoc Networks
Abstract— Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been show...
Nikhil Bansal, Zhen Liu
MOBICOM
2003
ACM
15 years 4 months ago
Distributed algorithms for guiding navigation across a sensor network
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed acros...
Qun Li, Michael DeRosa, Daniela Rus
SIGMETRICS
2000
ACM
107views Hardware» more  SIGMETRICS 2000»
15 years 3 months ago
Detecting shared congestion of flows via end-to-end measurement
Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flow...
Dan Rubenstein, James F. Kurose, Donald F. Towsley