Sciweavers

3486 search results - page 642 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
NSDI
2010
14 years 11 months ago
Scalable WiFi Media Delivery through Adaptive Broadcasts
Current WiFi Access Points (APs) choose transmission parameters when emitting wireless packets based solely on channel conditions. In this work we explore the benefits of deciding...
Sayandeep Sen, Neel Kamal Madabhushi, Suman Banerj...
SENSYS
2010
ACM
14 years 7 months ago
Revealing the hidden lives of underground animals using magneto-inductive tracking
Currently, there is no existing method for automatically tracking the location of burrowing animals when they are underground, consequently zoologists only have a partial view of ...
Andrew Markham, Niki Trigoni, Stephen A. Ellwood, ...
COMCOM
2004
98views more  COMCOM 2004»
14 years 9 months ago
End system multicast: an architectural infrastructure and topological optimization
Although IP-multicast has been proposed and investigated for years, there are major problems inherent in the IP-multicasting technique, e.g., difficulty to scale up the system, di...
Starsky H. Y. Wong, John C. S. Lui
CCS
2008
ACM
14 years 11 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
CASES
2010
ACM
14 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman