Sciweavers

259 search results - page 50 / 52
» Architecture and protocols for the Internet of Things: A cas...
Sort
View
INFOCOM
2003
IEEE
14 years 5 days ago
Adaptive Data Structures for IP Lookups
— The problem of efficient data structures for IP lookups has been well studied in literature. Techniques such as LC tries and Extensible Hashing are commonly used. In this pape...
Ioannis Ioannidis, Ananth Grama, Mikhail J. Atalla...
SRDS
2003
IEEE
14 years 5 days ago
Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications
In this paper we investigate dependability issues of nextgeneration distributed multimedia applications. Examples of such applications are autonomous vehicle control, telemedicine...
Domenico Cotroneo, Cristiano di Flora, Generoso Pa...
CASCON
2003
116views Education» more  CASCON 2003»
13 years 8 months ago
Workload characterization for an E-commerce web site
Electronic commerce servers have a significant presence in today’s Internet. Corporations require good performance for their business processes. To date, little empirical evide...
Qing Wang, Dwight J. Makaroff, H. Keith Edwards, R...
COMCOM
2008
147views more  COMCOM 2008»
13 years 7 months ago
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infra...
Azzedine Boukerche, Horacio A. B. F. de Oliveira, ...
CCS
2009
ACM
14 years 7 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...