Sciweavers

2562 search results - page 380 / 513
» An Internet without the Internet protocol
Sort
View
CCS
2007
ACM
14 years 4 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
COREGRID
2007
Springer
14 years 4 months ago
Atomic Commitment in Transactional DHTs
We investigate the problem of atomic commit in transactional database systems built on top of Distributed Hash Tables. Therefore we present a framework for DHTs to provide strong d...
Monika Moser, Seif Haridi
EUROGP
2007
Springer
102views Optimization» more  EUROGP 2007»
14 years 4 months ago
Real-Time, Non-intrusive Evaluation of VoIP
Abstract. Speech quality, as perceived by the users of Voice over Internet Protocol (VoIP) telephony, is critically important to the uptake of this service. VoIP quality can be deg...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...
ICCSA
2007
Springer
14 years 4 months ago
Route Optimization with Additional Destination-Information in Mobile Networks
Abstract. In nested mobile networks with NEMO basic support protocol [3], the pinball routing problem occurs because since it is based on bi-directional tunneling between the mobil...
Jeonghoon Park, Sangho Lee, Youho Lee, Hyunseung C...
PAM
2007
Springer
14 years 4 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston