Sciweavers

5856 search results - page 1029 / 1172
» Developing Query Patterns
Sort
View
GLOBECOM
2010
IEEE
14 years 8 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
IEAAIE
2010
Springer
14 years 8 months ago
Down-Up-Down Behavior Generation for Interactive Robots
Behavior generation in humans and animals usually employs a combination of bottom-up and top-down patterns. Most available robotic architectures utilize either bottom-up or top-dow...
Yasser F. O. Mohammad, Toyoaki Nishida
INFOCOM
2010
IEEE
14 years 8 months ago
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels
We develop a general approach for designing scheduling policies for real-time traffic over wireless channels. We extend prior work, which characterizes a real-time flow by its traf...
I-Hong Hou, P. R. Kumar
NOMS
2010
IEEE
228views Communications» more  NOMS 2010»
14 years 7 months ago
DA VINCI: A tool to improve VoIP call routing configurations
As IP telephony becomes a critical part of the enterprise network infrastructure, there is an increasing need for tools to help manage VoIP systems. In this paper, we introduce DA ...
Kunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae
EUROPKI
2009
Springer
14 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
« Prev « First page 1029 / 1172 Last » Next »