Sciweavers

1506 search results - page 3 / 302
» Network Coordinates in the Wild
Sort
View
ICISC
2008
89views Cryptology» more  ICISC 2008»
14 years 11 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
MOBISYS
2009
ACM
15 years 10 months ago
BlueMonarch: a system for evaluating bluetooth applications in the wild
Despite Bluetooth's popularity, low cost, and low power requirements, Bluetooth applications remain remarkably unsophisticated. Although the research community and industry h...
Timothy J. Smith, Stefan Saroiu, Alec Wolman
IMC
2009
ACM
15 years 4 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
IMC
2010
ACM
14 years 7 months ago
Comparing DNS resolvers in the wild
The Domain Name System (DNS) is a fundamental building block of the Internet. Today, the performance of more and more applications depend not only on the responsiveness of DNS, bu...
Bernhard Ager, Wolfgang Mühlbauer, Georgios S...
ICASSP
2011
IEEE
14 years 1 months ago
Audio recognition in the wild: Static and dynamic classification on a real-world database of animal vocalizations
We present a study on purely data-based recognition of animal sounds, performing evaluation on a real-world database obtained from the Humboldt-University Animal Sound Archive. As...
Felix Weninger, Björn Schuller