Sciweavers

25175 search results - page 4878 / 5035
» MPEG-4 systems and applications
Sort
View
101
Voted
P2P
2006
IEEE
121views Communications» more  P2P 2006»
15 years 4 months ago
The Orchard Algorithm: P2P Multicasting without Free-Riding
The main purpose of many current peer-to-peer (P2P) networks is off-line file sharing. However, a potentially very promising use of such networks is to share video streams (e.g.,...
Jan-David Mol, Dick H. J. Epema, Henk J. Sips
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 4 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
TRIDENTCOM
2006
IEEE
15 years 4 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
VTC
2006
IEEE
110views Communications» more  VTC 2006»
15 years 4 months ago
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
— WLANs will become a major portion of the fourth generation (4G) cellular system. The seamless handoff problem in WLANs is a very important design issue to support the new astou...
Yuh-Shyan Chen, Chung-Kai Chen, Ming-Chin Chuang
VTC
2006
IEEE
203views Communications» more  VTC 2006»
15 years 4 months ago
The 3G Long-Term Evolution - Radio Interface Concepts and Performance Evaluation
Abstract—3GPP is in the process of defining the long-term evolution (LTE) for 3G radio access, sometimes referred to as Super3G, in order to maintain the future competitiveness o...
Erik Dahlman, Hannes Ekström, Anders Furuskar...
« Prev « First page 4878 / 5035 Last » Next »