Sciweavers

2200 search results - page 333 / 440
» Hop Integrity in Computer Networks
Sort
View
150
Voted
ACSW
2003
15 years 4 months ago
A Survey of Research on Context-Aware Homes
The seamless integration of people, devices and computation will soon become part of our daily life. Sensors, actuators, wireless networks and ubiquitous devices powered by intelli...
Sven Meyer, Andry Rakotonirainy
168
Voted
IWCMC
2009
ACM
15 years 10 months ago
Joint turbo equalization for relaying schemes over frequency-selective fading channels
We propose a single carrier joint frequency domain equalization and interference cancellation (FDE-IC) with diversity combining for different relaying schemes. We consider amplif...
Houda Chafnaji, Tarik Ait-Idir, Halim Yanikomerogl...
COMSWARE
2008
IEEE
15 years 9 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
128
Voted
OTM
2007
Springer
15 years 9 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
HPCC
2005
Springer
15 years 9 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore