Sciweavers

537 search results - page 42 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
FLAIRS
2009
14 years 7 months ago
Computational Considerations in Correcting User-Language
1 This study evaluates the robustness of established computational indices used to assess text relatedness in userlanguage. The original User-Language Paraphrase Corpus (ULPC) was ...
Adam M. Renner, Philip M. McCarthy, Danielle S. Mc...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 4 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
WISEC
2010
ACM
15 years 4 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
MOBICOM
2004
ACM
15 years 3 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the e...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
ICNP
2007
IEEE
15 years 4 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui