Sciweavers

537 search results - page 54 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
ICDCS
2009
IEEE
15 years 8 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 5 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
IPPS
2006
IEEE
15 years 5 months ago
Privacy-aware presence management in instant messaging systems
Information about online presence allows participants of instant messaging (IM) systems to determine whether their prospective communication partners will be able to answer their ...
Karsten Loesing, Markus Dorsch, Martin Grote, Knut...
ICMCS
2005
IEEE
101views Multimedia» more  ICMCS 2005»
15 years 4 months ago
Speech-adaptive layered G.729 coder for loss concealments of real-time voice over IP
In this paper, we propose a speech-adaptive layered-coding (LC) scheme for the loss concealments of real-time CELPcoded speech transmitted over IP networks. Based on the ITU G.729...
Batu Sat, Benjamin W. Wah
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 4 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu