Sciweavers

1341 search results - page 124 / 269
» Periods in Extensions of Words
Sort
View
86
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
105
Voted
VTC
2007
IEEE
150views Communications» more  VTC 2007»
15 years 7 months ago
Analysis of Resource Reservation Aggregation in On-Board Networks
Abstract— The concept of providing mobile Internet connectivity for passengers in public transport vehicles, where users connect to a local network that attaches to the Internet v...
Muhammad Ali Malik, Lavy Libman, Salil S. Kanhere,...
135
Voted
ACSAC
2006
IEEE
15 years 6 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
115
Voted
BROADNETS
2006
IEEE
15 years 6 months ago
Robust Demand-Driven Video Multicast over Ad hoc Wireless Networks
Abstract— In this paper, we address the problem of video multicasting in ad hoc wireless networks. The salient characteristics of video traffic make conventional multicasting pr...
D. Agrawal, Tamma Bheemarjuna Reddy, C. Siva Ram M...
128
Voted
ECRTS
2006
IEEE
15 years 6 months ago
Sensitivity Analysis for Fixed-Priority Real-Time Systems
At early stages in the design of real-time embedded applications, the timing attributes of the computational activities are often incompletely specified or subject to changes. Lat...
Enrico Bini, Marco Di Natale, Giorgio C. Buttazzo