Sciweavers

2601 search results - page 253 / 521
» Quantum Network Coding
Sort
View
113
Voted
CHI
2008
ACM
15 years 4 months ago
Comparing access methods and quality of 3g mobile video streaming services
In this paper we examine the access methods and the quality of experience of current unicast video streaming services in 3G mobile networks. A packet-switched mobile video client,...
Marcin Davies, Antitza Dantcheva, Peter Fröhl...
116
Voted
CORR
2010
Springer
98views Education» more  CORR 2010»
15 years 2 months ago
Linear Operator Channels over Finite Fields
Motivated by random linear network coding, we study the communication through channels, called linear operator channels (LOCs), that perform linear operation over finite fields. Fo...
Shenghao Yang, Siu-Wai Ho, Jin Meng, En-Hui Yang
114
Voted
SAC
2010
ACM
15 years 9 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
138
Voted
TKDE
2010
272views more  TKDE 2010»
15 years 1 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
153
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden