Sciweavers

1075 search results - page 174 / 215
» Calculating the Number of Tunnels
Sort
View
3DGIS
2006
Springer
14 years 3 months ago
The Application of GIS in Maritime Boundary Delimitation
The Democratic Republic of Timor-Leste (East Timor) attained independence on 20 May 2002, marking its separation from Indonesia. As a newly independent country, East Timor is face...
I Made Andi Arsana, Chris Rizos, Clive Schofield
ICN
2005
Springer
14 years 3 months ago
Network Traffic Sampling Model on Packet Identification
Spatially coordinated packet sampling can be implemented by using a deterministic function of packet content to determine the selection decision for a given packet. In this way, a...
Guang Cheng, Jian Gong, Wei Ding 0001
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 3 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
IDEAL
2003
Springer
14 years 3 months ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...
MMB
2010
Springer
194views Communications» more  MMB 2010»
14 years 2 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt