Sciweavers

1047 search results - page 184 / 210
» Using Objects for Next Generation Communication Services
Sort
View
SECON
2008
IEEE
15 years 3 months ago
A Demonstration of Video over a User Centric Prioritization Scheme for Wireless LANs
—Due to the unreliable nature of the wireless medium, provisioning of the Quality of Service (QoS) in wireless LANs is by far more complicated than in wired networks. In this dem...
Konstantinos Choumas, Thanasis Korakis, Leandros T...
SAC
2004
ACM
15 years 2 months ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
ISADS
1999
IEEE
15 years 1 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
JMM2
2006
113views more  JMM2 2006»
14 years 9 months ago
Personal Media Producer: A System for Creating 3D CG Animation from Mobile Phone E-mail
Mobile phone e-mail is increasingly being chosen by consumers as their primary communication tool. Messages exchanged among mobile phone users frequently contain "emoticons (s...
Koichi Emura, Makoto Yasugi, Toshiyuki Tanaka, Sei...
TON
2008
239views more  TON 2008»
14 years 9 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...