Sciweavers

18 search results - page 3 / 4
» Retransmission steganography and its detection
Sort
View
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 4 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
IPCCC
2005
IEEE
13 years 12 months ago
A tree-based reliable multicast scheme exploiting the temporal locality of transmission errors
Tree-based reliable multicast protocols provide scalability by distributing error-recovery tasks among several repair nodes. These repair nodes keep in their buffers all packets t...
Jinsuk Baek, Jehan-François Pâris
IWDW
2007
Springer
14 years 15 days ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
LCN
2008
IEEE
14 years 23 days ago
A medium access control protocol for UWB sensor networks with QoS support
—Ultra-wideband (UWB) is a physical (PHY) layer technology that promises high transmission rates, as well as high resistance to noise and multipath effects. However, the impulseb...
Jicong Tan, Mun-Choon Chan, Hwee-Xian Tan, Peng Yo...
INFOCOM
2003
IEEE
13 years 11 months ago
Responding to Spurious Timeouts in TCP
- Delays on Internet paths, especially including wireless links, can be highly variable. On the other hand, a current trend for modern TCPs is to deploy a fine-grain retransmission...
Andrei Gurtov, Reiner Ludwig