Sciweavers

17951 search results - page 3435 / 3591
» Network Coding Applications
Sort
View
115
Voted
NDSS
2008
IEEE
15 years 8 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 8 months ago
Adaptive-Buffer Power Save Mechanism for Mobile Multimedia Streaming
— Wireless networks are becoming a part of everyday life for many people. When a mobile device has wireless LAN capability, multimedia content can be streamed over a wireless net...
Janet Adams
138
Voted
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
15 years 8 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...
LCN
2007
IEEE
15 years 8 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
129
Voted
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel
« Prev « First page 3435 / 3591 Last » Next »