Sciweavers

12301 search results - page 2073 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
WS
2004
ACM
15 years 10 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
WICON
2008
15 years 6 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 4 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
14 years 7 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...
ICPR
2008
IEEE
16 years 6 months ago
Real-time abnormal motion detection in surveillance video
Video surveillance systems produce huge amounts of data for storage and display. Long-term human monitoring of the acquired video is impractical and ineffective. Automatic abnorma...
Nahum Kiryati, Shay Rochel, Tammy Riklin-Raviv, Ya...
« Prev « First page 2073 / 2461 Last » Next »