Sciweavers

738 search results - page 71 / 148
» Comparison of Approaches to Service Deployment
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
CN
2002
98views more  CN 2002»
13 years 8 months ago
New models and algorithms for programmable networks
In todays IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to la...
Danny Raz, Yuval Shavitt
EDBT
2002
ACM
246views Database» more  EDBT 2002»
14 years 9 months ago
Impact and Potential of User Profiles Used for Distributed Query Processing Based on Literature Services
Applying meta search systems is a suitable method to support the user if there are many different services. Due to information splitting strategies of literature services existing ...
Bethina Schmitt
OSN
2008
97views more  OSN 2008»
13 years 8 months ago
Managing Layer 1 VPN services
Control Plane architectures enhance transport networks with distributed signaling and routing mechanisms which allow dynamic connection control. As a result, layer 1 switching net...
Neumar Malheiros, Edmundo Roberto Mauro Madeira, F...