Sciweavers

900 search results - page 84 / 180
» Controlling Inbound Traffic
Sort
View
VISUALIZATION
1999
IEEE
14 years 1 months ago
Visualization of Conflicts and Resolutions in a "Free Flight" Scenario
"Free Flight" will change today's air traffic control system by giving pilots increased flexibility to choose and modify their routes in real time, reducing costs a...
Ronald Azuma, Howard Neely, Michael Daily, Mario C...
AINA
2006
IEEE
14 years 1 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
WICON
2008
13 years 10 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
MASCOTS
2001
13 years 10 months ago
On Class-Based Isolation of UDP, Short-Lived and Long-Lived TCP Flows
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
Selma Yilmaz, Ibrahim Matta
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 3 months ago
Optimal Bandwidth Provision at WiMAX MAC Service Access Point on Uplink Direction
—In this paper, the IEEE 802.16 protocol is investigated with respect to the bandwidth provision problem arising at the Medium Access Control (MAC) layer. The aim is to optimally...
Mario Marchese, Maurizio Mongelli