Sciweavers

211 search results - page 25 / 43
» The effect of cooperation at the network protocol level
Sort
View
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 6 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
WWW
2002
ACM
16 years 14 days ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
CIS
2009
Springer
15 years 6 months ago
On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images
Abstract—The growth in practical applications for iris biometrics has been accompanied by relevant developments in the underlying algorithms and techniques. Along with the resear...
Gil Melfe Mateus Santos, Hugo Pedro Martins Carric...
ACSAC
2009
IEEE
15 years 6 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
TSP
2008
100views more  TSP 2008»
14 years 11 months ago
Time-Slotted Round-Trip Carrier Synchronization for Distributed Beamforming
Transmit beamforming is an energy-efficient wireless communication technique that allows a transmitter with two or more antennas to focus its bandpass signal in an intended directi...
D. Richard Brown III, H. Vincent Poor