Sciweavers

595 search results - page 17 / 119
» Session 7: Demonstrations
Sort
View
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
15 years 3 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...
IJHPCN
2008
75views more  IJHPCN 2008»
14 years 9 months ago
A hybrid connector for efficient web servers
: In this paper we introduce a novel web server architecture that combines the best aspects of both the multithreaded and the event-driven architectures, the two major existing alt...
David Carrera, Vicenç Beltran, Jordi Torres...
TIT
2002
148views more  TIT 2002»
14 years 9 months ago
The use of multiuser detectors for multicasting in wireless ad hoc CDMA networks
In this paper, we address the issue of performance of linear multiuser detectors for a multicasting application in an ad hoc wireless network. Using a code-division multiple-access...
Chandrasekar Sankaran, Anthony Ephremides
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 4 months ago
TCP Dynamics in 802.11 Wireless Local Area Networks
— In 802.11 wireless links with disabled MAC retries, data and ACK packets within a TCP session collide resulting in packet losses. We show in this paper that in this situation, ...
Sumathi Gopal, Sanjoy Paul
67
Voted
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 2 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh