Sciweavers

1404 search results - page 243 / 281
» internet 2010
Sort
View
VTC
2010
IEEE
171views Communications» more  VTC 2010»
14 years 8 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 8 months ago
Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic
Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different locatio...
Ling Zhou, Wei-xiong Ding, Yu-xi Zhu
ACSAC
2010
IEEE
14 years 7 months ago
Toward worm detection in online social networks
Worms propagating in online social networking (OSN) websites have become a major security threat to both the websites and their users in recent years. Since these worms exhibit un...
Wei Xu, Fangfang Zhang, Sencun Zhu
ACSAC
2010
IEEE
14 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
ACSAC
2010
IEEE
14 years 7 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...