Sciweavers

775 search results - page 99 / 155
» On the Performance of Bandwidth Estimation Tools
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements
Abstract—We investigate the reliability of radio channel simulators in capturing the important properties of radio channels throughout a well-specified environment. Indoor envir...
Aliye Özge Kaya, Larry J. Greenstein, Wade Tr...
IPSN
2007
Springer
15 years 4 months ago
Energy-optimized image communication on resource-constrained sensor platforms
Energy-efficient image communication is one of the most important goals for a large class of current and future sensor network applications. This paper presents a quantitative com...
Dong-U Lee, Hyungjin Kim, Steven Tu, Mohammad H. R...
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 4 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
ICEIS
2003
IEEE
15 years 3 months ago
Widam - Web Interaction Display and Monitoring
: In this paper we describe the design and implementation of a system called Web Interaction Display and Monitoring (WIDAM). We have developed a web based client-server application...
Hugo Gamboa, Vasco Ferreira
ICPP
2002
IEEE
15 years 2 months ago
EMPOWER: A Scalable Framework for Network Emulation
The development and implementation of new network protocols and applications need accurate, scalable, reconfigurable, and inexpensive tools for debugging, testing, performance tun...
Pei Zheng, Lionel M. Ni