Sciweavers

7544 search results - page 1330 / 1509
» Network Forensics Analysis
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 11 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 11 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...
SIBGRAPI
2009
IEEE
15 years 11 months ago
Multi-Frame Motion Detection for Active/Unstable Cameras
—Network cameras, extensively used in video surveillance, often allow pan-tilt-zoom functionality and are also subject to wind load and mount vibrations, thus causing video frame...
Mirko Ristivojevic, Janusz Konrad
P2P
2009
IEEE
126views Communications» more  P2P 2009»
15 years 11 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...
RTCSA
2009
IEEE
15 years 11 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
« Prev « First page 1330 / 1509 Last » Next »