Sciweavers

303 search results - page 45 / 61
» On the enhancement of a differentiated services scheme
Sort
View
111
Voted
JSAC
2007
180views more  JSAC 2007»
14 years 11 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 6 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
ESORICS
2009
Springer
16 years 9 days ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
INFOCOM
2002
IEEE
15 years 4 months ago
Resource Management in Third Generation Mobile Communication Systems Employing Smart Antennas
— Third Generation (3G) Mobile Communication systems will provide enhanced high-speed data, multimedia, and voice services to mobile users. Beam forming techniques have been prop...
Shakheela H. Marikar, Luiz A. DaSilva
PET
2009
Springer
15 years 6 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...