Sciweavers

2242 search results - page 353 / 449
» Using Simulation in Call Centers
Sort
View
AINA
2010
IEEE
15 years 2 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
TC
2010
15 years 1 months ago
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections
—Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Prec...
Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel ...
TON
2010
90views more  TON 2010»
15 years 1 months ago
On burst transmission scheduling in mobile TV broadcast networks
—In mobile TV broadcast networks, the base station broadcasts TV channels in bursts such that mobile devices can receive a burst of traffic and then turn off their radio frequen...
Mohamed Hefeeda, Cheng-Hsin Hsu
TPDS
2010
103views more  TPDS 2010»
15 years 1 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
GLOBECOM
2010
IEEE
15 years 1 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...