Sciweavers

430 search results - page 17 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
114
Voted
BMCBI
2010
89views more  BMCBI 2010»
15 years 16 days ago
Semi-automatic identification of punching areas for tissue microarray building: the tubular breast cancer pilot study
Background: Tissue MicroArray technology aims to perform immunohistochemical staining on hundreds of different tissue samples simultaneously. It allows faster analysis, considerab...
Federica Viti, Ivan Merelli, Mieke Timmermans, Mic...
ISCC
2006
IEEE
15 years 6 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
116
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
114
Voted
FTDCS
2004
IEEE
15 years 4 months ago
A Distributed Buffer Management Approach Supporting IPv6 Mobility
In wireless local area networks (WLANs), mobility support is essential for providing seamless services. The current Mobile IP standard suffers several problems, especially for acc...
Yu-Hung Liu, Yaw-Chung Chen
174
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...