Sciweavers

665 search results - page 78 / 133
» Loss Differentiated Rate Adaptation in Wireless Networks
Sort
View
IPPS
2006
IEEE
15 years 3 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
COMCOM
2008
123views more  COMCOM 2008»
14 years 10 months ago
TCP throughput enhancement in wired-cum-wireless network
Performance of the TCP Congestion Control Algorithm has been the focus of research over the last decade. In this paper we propose modifications to TCP Congestion Control to improv...
Anup K. Ghosh, Amitava Mukherjee, Debashis Saha
ICMCS
2005
IEEE
112views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Proxy-based reference picture selection for real-time video transmission over mobile networks
We propose a framework for error robust real-time video transmission over wireless networks. In our approach, we cope with packet loss on the downlink by retransmitting lost packe...
Wei Tu, Eckehard G. Steinbach
AI50
2006
15 years 1 months ago
Adaptive Multi-modal Sensors
Compressing real-time input through bandwidth constrained connections has been studied within robotics, wireless sensor networks, and image processing. When there are bandwidth con...
Kyle Ira Harrington, Hava T. Siegelmann
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta