Sciweavers

4761 search results - page 771 / 953
» Performance of Protocols
Sort
View
118
Voted
MOBIHOC
2004
ACM
16 years 3 months ago
Error characteristics of ad hoc positioning systems (aps)
APS algorithms use the basic idea of distance vector routing to find positions in an ad hoc network using only a fraction of landmarks, for example GPS enabled nodes. All the node...
Dragos Niculescu, Badri Nath
130
Voted
SOSP
2001
ACM
16 years 18 days ago
Wide-Area Cooperative Storage with CFS
The Cooperative File System (CFS) is a new peer-to-peer readonly storage system that provides provable guarantees for the efficiency, robustness, and load-balance of file storag...
Frank Dabek, M. Frans Kaashoek, David R. Karger, R...
128
Voted
WISEC
2010
ACM
15 years 10 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
122
Voted
PAM
2010
Springer
15 years 10 months ago
Measuring and Evaluating TCP Splitting for Cloud Services
In this paper, we examine the benefits of split-TCP proxies, deployed in an operational world-wide network, for accelerating cloud services. We consider a fraction of a network co...
Abhinav Pathak, Angela Wang, Cheng Huang, Albert G...
123
Voted
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 10 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung