Sciweavers

900 search results - page 75 / 180
» Controlling Inbound Traffic
Sort
View
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
14 years 3 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
ICAT
2003
IEEE
14 years 2 months ago
Hierarchical QoS Architecture for Networked Virtual Dancing Environment
In this paper, we present the hierarchical QoS architecture for the virtual dancing environment. In this system, geographically distributed users share the virtual dancing hall an...
Jin Ryong Kim, Youjip Won, Beomeun Kim
USS
2008
13 years 11 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
IADIS
2004
13 years 10 months ago
Telecollaboration - a case study for performance analysis of voip systems
The evolving nature of complex traffic issues of IP (Internet Protocol)-based Telecollaboration (TC) business system technology requires an intuitive understanding for the partici...
Venkatesh Mahadevan, Zenon Chaczko
NETWORKING
2000
13 years 10 months ago
TCP/IP over the Bluetooth Wireless Ad-hoc Network
Bluetooth is a wireless ad-hoc network concept that was presented in February 1998 by its five original promoters Ericsson, Nokia, IBM, Toshiba and Intel. With Bluetooth, mobile te...
Niklas Johansson, Maria Kihl, Ulf Körner