Sciweavers

4761 search results - page 716 / 953
» Performance of Protocols
Sort
View
IJIPT
2010
147views more  IJIPT 2010»
15 years 2 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
MICCAI
2010
Springer
15 years 2 months ago
Automatic Lung Lobe Segmentation Using Particles, Thin Plate Splines, and Maximum a Posteriori Estimation
We present a fully automatic lung lobe segmentation algorithm that is effective in high resolution computed tomography (CT) datasets in the presence of confounding factors such as ...
James C. Ross, Raúl San José Est&eac...
NEW2AN
2010
Springer
15 years 2 months ago
Heuristic Congestion Control for Message Deletion in Delay Tolerant Network
Delay tolerant network (DTN) challenges on large delay of communication, opportunistic and intermittent connectivity so that data can be transferred over vulnerable network. Most r...
Lertluck Leela-amornsin, Hiroshi Esaki
TMC
2010
137views more  TMC 2010»
15 years 2 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
TMC
2010
111views more  TMC 2010»
15 years 2 months ago
Interference Management and Rate Adaptation in OFDM-Based UWB Networks
—Ultra-wideband (UWB) communications has emerged as a promising technology for high data rate wireless personal area networks (WPANs). Several proposals for UWB-based WPANs have ...
Raed T. Al-Zubi, Marwan Krunz