Sciweavers

2945 search results - page 271 / 589
» Noisy Network Coding
Sort
View
163
Voted
PERCOM
2007
ACM
16 years 3 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan
VIZSEC
2007
Springer
15 years 10 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
EURONGI
2008
Springer
15 years 5 months ago
Image Recognition Traffic Patterns for Wireless Multimedia Sensor Networks
The objective of this work is to identify some of the traffic characteristics of Wireless Multimedia Sensor Networks (WMSN). Applications such as video surveillance sensor networks...
Ruken Zilan, José M. Barceló-Ordinas...
ICNP
2009
IEEE
15 years 10 months ago
Scalable Video Multicast in Multi-carrier Wireless Data Systems
—Future 4G cellular networks are featured with high data rate and improved coverage, which will enable realtime video multicast and broadcast services. Scalable video coding is v...
Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Ra...
CCS
2009
ACM
15 years 8 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...