Sciweavers

1504 search results - page 298 / 301
» Networked control systems with packet delays and losses
Sort
View
COMPSAC
2009
IEEE
15 years 1 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
66
Voted
AISS
2010
112views more  AISS 2010»
14 years 6 months ago
A QoS-based P2P Streaming for Ubiquitous Personal IPTV
In this paper, a P2P(Peer-to-Peer) streaming approach is proposed for the implementation of ubiquitous personal IPTV systems which allow any Internet users with proper network con...
Seungchul Park
TRIDENTCOM
2006
IEEE
15 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
MMS
2006
14 years 9 months ago
Adaptive receiver-driven streaming from multiple senders
This paper presents design and evaluation of an adaptive streaming mechanism from multiple senders to a single receiver in Peer-toPeer (P2P) networks, called P2P Adaptive Layered ...
Nazanin Magharei, Reza Rejaie
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
15 years 11 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik