Zobrazeno 1 - 10
of 169
pro vyhledávání: '"Imad Aad"'
Autor:
Julien Eberle, Daniel Gatica-Perez, Jan Blom, Imad Aad, J. Laurila, Olivier Bornet, Olivier Dousse, Markus Miettinen, Trinh Minh Tri Do
Publikováno v:
Pervasive and Mobile Computing. 9:752-771
This paper presents an overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based evaluation of mobile data analysis methodologies. First
Publikováno v:
LCN
Service Centric Networking (SCN) extends Information Centric Networking (ICN) from content to services enabling clients to request services without having them coupled to specific servers. This brings new authentication challenges since legacy authen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c92f5a941d9e53f0e8526bc6f08ab8a9
Publikováno v:
IMDEA Networks Institute Digital Repository
instname
IMDEA Networks Institute
instname
IMDEA Networks Institute
We present a system for real-time traffic support in infrastructure and ad hoc IEEE 802.11 networks. The proposed elastic MAC (E-MAC) protocol provides a distributed transmission schedule for stations with real-time traffic requirements, while allowi
Publikováno v:
IEEE/ACM Transactions on Networking. 16:791-802
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to m
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319225715
WWIC
WWIC
In this paper we present BitWorker, a platform for community distributed computing based on BitTorrent. Any splittable task can be easily specified by a user in a meta-information task file, such that it can be downloaded and performed by other volun
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::28926baef59072dc3a1680c2c8fdba9f
Autor:
Claude Castelluccia, Imad Aad
Publikováno v:
Computer Networks. 41:505-526
The IETF is currently working on service differentiation in the Internet. However, in wireless environments where bandwidth is scarce and channel conditions are variable, IP differentiated services are sub-optimal without lower layers’ support. In
Autor:
Claude Castelluccia, Imad Aad
Publikováno v:
Annales Des Télécommunications. 58:397-416
IEEE 802.11 is the most deployed wireless local area networking standard nowadays. It uses carrier sense multiple access with collision avoldance (CSMA/CA) to, resolve contention between nodes. Contention windows (CW) change dynamically to adapt to t
Autor:
Jean-Pierre Hubaux, Kubra Kalkan, Igor Bilogrevic, Imad Aad, Vishal Joneja, Murtuza Jadliwala
Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current (or preferred) l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::82bb67a20abe1be7d1d4bd46c7835212
Publikováno v:
ARES
Biswas, Debmalya; Aad, Imad; Perrucci, Gian Paolo (2 September 2013). Privacy Panel: Usable and Quantifiable Mobile Privacy. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 218-223). IEEE 10.1109/ARES.2013.29
Biswas, Debmalya; Aad, Imad; Perrucci, Gian Paolo (2 September 2013). Privacy Panel: Usable and Quantifiable Mobile Privacy. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 218-223). IEEE 10.1109/ARES.2013.29
The ever increasing popularity of apps stems from their ability to provide highly customized services to the user. The flip side is that in order to provide such services, apps need access to very sensitive private information about the user. This le
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0f34b4c7d056d810edf419dee746e406
Autor:
Laurent Bindschaedler, Imad Aad, István Lám, Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642312045
Pervasive
Pervasive
Wireless network operators increasingly deploy WiFi hotspots and low-power, low-range base stations in order to satisfy users' growing demands for context-aware services and performance. In addition to providing better service, such capillary infrast
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::191dbe62c3fd901290e70dd07902616c
https://doi.org/10.1007/978-3-642-31205-2_23
https://doi.org/10.1007/978-3-642-31205-2_23