Sciweavers

1692 search results - page 321 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
GLOBECOM
2006
IEEE
15 years 5 months ago
Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
— At the forefront of the recent advances in mobile networks is the development of sophisticated mobility management mechanisms that are usually based on Mobile IP and its deriva...
Antonios Argyriou, Vijay K. Madisetti
EMSOFT
2005
Springer
15 years 5 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
VTC
2007
IEEE
15 years 6 months ago
Uplink VoIP Support for 3GPP EUTRA
—Evolved UTRA (EUTRA) is currently under study by 3GPP standards organizations as a long term evolution (LTE) for current generation Universal Terrestrial Radio Access (UTRA) net...
Ravi Nory, Ravi Kuchibhotla, Robert Love, Yakun Su...
ICOIN
2007
Springer
15 years 5 months ago
On the Use of Manchester Violation Test in Detecting Collision
Smart devices in the ubiquitous computing environment implement service/device discovery protocol that helps discovering each other and the services provided. As client device may ...
Yee-Loo Foo, Hiroyuki Morikawa