Sciweavers

8177 search results - page 1456 / 1636
» Detecting System Emulators
Sort
View
ICNP
2003
IEEE
15 years 9 months ago
Improving TCP Startup Performance Using Active Measurements: Algorithm and Evaluation
TCP Slow Start exponentially increases the congestion window size to detect the proper congestion window for a network path. This often results in significant packet loss, while ...
Ningning Hu, Peter Steenkiste
ICRA
2003
IEEE
160views Robotics» more  ICRA 2003»
15 years 9 months ago
Adapting navigation strategies using motions patterns of people
— As people move through their environments, they do not move randomly. Instead, they are often engaged in typical motion patterns, related to specific locations they might be i...
Maren Bennewitz, Wolfram Burgard, Sebastian Thrun
ICSM
2003
IEEE
15 years 9 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
INFOCOM
2003
IEEE
15 years 9 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
« Prev « First page 1456 / 1636 Last » Next »