Sciweavers

537 search results - page 67 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
WICON
2008
14 years 11 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar
HUC
2010
Springer
14 years 11 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
INFOCOM
2008
IEEE
15 years 4 months ago
CTU: Capturing Throughput Dependencies in UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Previous studies on evaluating MAC protocols are based on pro...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
RTAS
1997
IEEE
15 years 2 months ago
Exploiting Redundancy for Timeliness in TCP Boston
While ATM bandwidth-reservation techniques are able to o er the guarantees necessary for the delivery of real-time streams in many applications (e.g. live audio and video), they s...
Azer Bestavros, Gitae Kim
TVCG
2008
106views more  TVCG 2008»
14 years 9 months ago
Scientific Sketching for Collaborative VR Visualization Design
We present four studies investigating tools and methodologies for artist-scientist-technologist collaboration in designing multivariate virtual reality (VR) visualizations. Design ...
Daniel F. Keefe, Daniel Acevedo Feliz, Jadrian Mil...