Sciweavers

280 search results - page 15 / 56
» Bandwidth-sharing in overloaded networks
Sort
View
ICNS
2009
IEEE
14 years 3 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ICN
2009
Springer
14 years 3 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ANOR
2011
96views more  ANOR 2011»
13 years 3 months ago
Global propagation of side constraints for solving over-constrained problems
This article deals with the resolution of over-constrained problems using constraint programming, which often imposes to add to the constraint network new side constraints. These ...
Thierry Petit, Emmanuel Poder
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 2 months ago
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasistatic dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random rem...
Marian Anghel, Kenneth A. Werley, Adilson E. Motte...
AUTOMATICA
1999
104views more  AUTOMATICA 1999»
13 years 8 months ago
Resource pricing and the evolution of congestion control
We describe ways in which the transmission control protocol of the Internet may evolve to support heterogeneous applications. We show that by appropriately marking packets at over...
Richard J. Gibbens, Frank P. Kelly