Sciweavers

7891 search results - page 145 / 1579
» Local Area Networking
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
An analytical approach to local sound field synthesis using linear arrays of loudspeakers
Methods like Wave Field Synthesis aim at the synthesis of a given desired sound field over a large receiver area. Practical limitations lead to considerable artifacts commonly re...
Jens Ahrens, Sascha Spors
INFOCOM
2010
IEEE
15 years 1 months ago
Universal Rigidity: Towards Accurate and Efficient Localization of Wireless Networks
A fundamental problem in wireless ad
Zhisu Zhu, Anthony Man-Cho So, Yinyu Ye
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 7 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
WS
2006
ACM
15 years 9 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
SRDS
2007
IEEE
15 years 9 months ago
Enhancing Edge Computing with Database Replication
As the use of the Internet continues to grow explosively, edge computing has emerged as an important technique for delivering Web content over the Internet. Edge computing moves d...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...