Sciweavers

642 search results - page 56 / 129
» Detecting Spoofed Packets
Sort
View
LCN
2002
IEEE
15 years 9 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung
ICMCS
2009
IEEE
114views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Pattern-Push: A low-delay mesh-push scheduling for live peer-to-peer streaming
In live peer-to-peer (P2P) streaming, each peer (child) has a number of supplying parents whose packets have to be scheduled and delivered in time for continuous playback at the c...
Guifeng Zheng, S.-H. Gary Chan, Xiaonan Luo, Ali C...
ICASSP
2011
IEEE
14 years 8 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...
166
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
CORR
2008
Springer
137views Education» more  CORR 2008»
15 years 4 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...