Sciweavers

8772 search results - page 1655 / 1755
» Business Services Networks
Sort
View
ICPADS
2005
IEEE
14 years 4 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
ICRA
2005
IEEE
217views Robotics» more  ICRA 2005»
14 years 4 months ago
Development of an Autonomous Mobile Surveillance System Using a Network-based RTK-GPS
- This paper describes an autonomous mobile surveillance system usually used in a factory premises with some high-rise buildings. This system consists of a wireless LAN network, a ...
Jun-ichi Meguro, Takumi Hashizume, Jun-ichi Takigu...
INFOCOM
2005
IEEE
14 years 3 months ago
dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems
— We leverage the buffering capabilities of end-systems to achieve scalable, asynchronous delivery of streams in a peer-to-peer environment. Unlike existing cache-and-relay schem...
Abhishek Sharma, Azer Bestavros, Ibrahim Matta
INFOCOM
2005
IEEE
14 years 3 months ago
Cooperation and decision-making in a wireless multi-provider setting
— In this paper we investigate network design for a wireless service provider using two orthogonal technologies: a WAN technology with uniform spatial coverage and set of LAN acc...
Alex Zemlianov, Gustavo de Veciana
ISCC
2005
IEEE
14 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
« Prev « First page 1655 / 1755 Last » Next »