The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As computing system continues to play an increasing role in daily life, user authentication is now an important component. One of the most widely accepted methods for user authentication is through proof of knowledge of a piece of secret information, such as password. However, entering this non-mutable secret for authentication in public space often allows attackers to steal the secret by shoulder...
In this paper, we present MobTrack, a single device system which aims to locate interfering radios on unlicensed ISM band in indoor environments. Compared with existing techniques which require a deployment of dense access points (APs), MobTrack only demands a single device equipped with multiple antennas. The location of an interfering signal source are estimated by computing the angle of arrival...
Cyclostationary analysis is a powerful tool to study the Signal-Selective Direction Estimation (SSDE) problem as different types of wireless signals have different cyclostationary patterns. Generally speaking, each type of wireless signal has unique cyclic frequencies with the frequency-selective property, which distinguishes itself from other types of signals. The cyclostationary property of a signal...
With the rapid growth of the scale, complexity and heterogeneity of Peer-to-Peer (P2P) systems, the handle of the peer's network-oblivious traffic and self-organization has become a great challenge. A potential solution is to deploy servers at different locations as appropriate. However, due to the unique features and requirements of P2P systems, the traditional placement models cannot yield the desirable...
Peer-to-Peer is one of the most popular live streaming delivery technologies owing to its scalability and low-cost. Most practical P2P streaming systems adopt hundreds of channels to deliver streaming to thousands of users simultaneously, and thus there is a great challenge to allocate server resources among these channels efficiently. In practice, most P2P systems have resorted to over-allocating...
Recent development of the peer-to-peer (P2P) live streaming technique has brought unprecedented new momentum to the Internet with the characters of effective, scalable, and low cost. However, before these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream,...
The goal of a video conferencing system is to deliver multimedia data to the conference participants efficiently and securely. To meet the requirement of a video conferencing system over the internet, many issues have to be addressed, such as security, scalability and heterogeneity. In this paper, we propose a secure and scalable video conferencing system named VCNF (Video Conference Network Foundation),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.