Sciweavers

2642 search results - page 467 / 529
» The development of Chez Scheme
Sort
View
ICON
2007
IEEE
15 years 7 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
102
Voted
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
15 years 7 months ago
Swept Volume approximation of polygon soups
— We present a fast GPU-based algorithm to approximate the Swept Volume (SV) boundary of arbitrary polygon soup models. Despite the extensive research on calculating the volume s...
Jesse C. Himmelstein, Etienne Ferre, Jean-Paul Lau...
93
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Proactive Scan: Fast Handoff with Smart Triggers for 802.11 Wireless LAN
Abstract— It has been a challenging problem to support VoIPtype delay sensitive applications in an 802.11 wireless LAN, because the standard handoff procedure implemented in many...
Haitao Wu, Kun Tan, Yongguang Zhang, Qian Zhang
106
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Robust Geo-Routing on Embeddings of Dynamic Wireless Networks
— Wireless routing based on an embedding of the connectivity graph is a very promising technique to overcome shortcomings of geographic routing and topology-based routing. This i...
Dominique Tschopp, Suhas N. Diggavi, Matthias Gros...
INFOCOM
2007
IEEE
15 years 7 months ago
Cooperative Strategies and Optimal Scheduling for Tree Networks
Abstract— In this paper, we develop and analyze a lowcomplexity cooperative protocol that significantly increases the average throughput of multi-hop upstream transmissions for ...
Alexandre de Baynast, Omer Gurewitz, Edward W. Kni...