Sciweavers

51
Voted
CN
2010
64views more  CN 2010»
14 years 10 months ago
Fast Filtered Sampling
Jianning Mai, Ashwin Sridharan, Hui Zang, Chen-Nee...
56
Voted
CN
2010
71views more  CN 2010»
14 years 10 months ago
Evading stepping-stone detection under the cloak of streaming media with SNEAK
Jaideep D. Padhye, Kush Kothari, Madhu Venkateshai...
79
Voted
CN
2010
86views more  CN 2010»
14 years 10 months ago
Defense techniques for low-rate DoS attacks against application servers
Gabriel Maciá-Fernández, Rafael Rodr...
CN
2010
90views more  CN 2010»
14 years 10 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
49
Voted
CN
2010
92views more  CN 2010»
14 years 10 months ago
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
Xiaodong Lin, Rongxing Lu, Davis Kwan, Xuemin Shen
48
Voted
CN
2010
81views more  CN 2010»
14 years 10 months ago
A Garch-based adaptive playout delay algorithm for VoIP
Ying Zhang, Damien Fay, Liam Kilmartin, Andrew W. ...
CN
2010
88views more  CN 2010»
14 years 10 months ago
Two-link failure protection in WDM mesh networks with p-cycles
In WDM networks, it is important to protect connections against link failures due to the high bandwidth provided by a fiber link. Although many p-cycle based schemes have been pro...
Taiming Feng, Long Long, Ahmed E. Kamal, Lu Ruan
75
Voted
CN
2010
110views more  CN 2010»
14 years 10 months ago
End-to-end quality of service seen by applications: A statistical learning approach
The focus of this work is on the estimation of quality of service (QoS) parameters seen by an application. Our proposal is based on end-to-end active measurements and statistical ...
Pablo Belzarena, Laura Aspirot
84
Voted
CN
2010
252views more  CN 2010»
14 years 10 months ago
A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks
Xiaohuan Yan, Y. Ahmet Sekercioglu, Sathya Narayan...
57
Voted
CN
2010
89views more  CN 2010»
14 years 10 months ago
Vulnerability analysis of RFID protocols for tag ownership transfer
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...