Sciweavers

4761 search results - page 757 / 953
» Performance of Protocols
Sort
View
153
Voted
AINA
2006
IEEE
15 years 9 months ago
Equation Based Congestion Control for Video Transmission over WCDMA Networks
The scheme of real time streaming video is one of the newcomers in wireless data communication, raising a number of new requirements in both telecommunication and data communicati...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
142
Voted
ICBA
2004
Springer
143views Biometrics» more  ICBA 2004»
15 years 9 months ago
Externalized Fingerprint Matching
The 9/11 tragedy triggered an increased interest in biometric passports. According to several sources [2], the electronic ID market is expected to increase by more than 50% per ann...
Claude Barral, Jean-Sébastien Coron, David ...
231
Voted
ACISP
2000
Springer
15 years 8 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski
132
Voted
IC
2004
15 years 5 months ago
A Web Interface for Nessus Network Security Scanner
A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports ...
Chuming Chen, Manton M. Matthews
135
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras