Sciweavers

2562 search results - page 145 / 513
» An Internet without the Internet protocol
Sort
View
PET
2004
Springer
14 years 3 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
ICNP
2003
IEEE
14 years 3 months ago
Optimal Resource Allocation in Overlay Multicast
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
Yi Cui, Yuan Xue, Klara Nahrstedt
LCN
2003
IEEE
14 years 3 months ago
PURPLE: Predictive Active Queue Management Utilizing Congestion Information
Active Queue Management (AQM) is an attempt to find a delicate balance between two antagonistic Internet queuing requirements: First, buffer space should be maximized to accommod...
Roman Pletka, Marcel Waldvogel, Soenke Mannal
INFOCOM
2002
IEEE
14 years 3 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao