Sciweavers

900 search results - page 99 / 180
» Controlling Inbound Traffic
Sort
View
ACSC
2003
IEEE
14 years 2 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
ICPR
2000
IEEE
14 years 2 months ago
Database Architecture for Autonomous Transportation Agents for On-Scene Networked Incident Management (ATON)
A collection of distributed databases forms an important architectural component of the ATON project for networked incidence management of highway traffic. The database sub-archit...
Mohan M. Trivedi, Shailendra K. Bhonsle, Amarnath ...
ICC
1997
IEEE
158views Communications» more  ICC 1997»
14 years 1 months ago
The Priority Token Bank in a Network of Queues
This paper takes a known approach for scheduling and admission control in integrated services networks1 , the Priority Token Bank (PTB), whose mechanism and performance have been ...
Mark A. Lynn, Jon M. Peha
INFOCOM
1992
IEEE
14 years 1 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel
ESORICS
2006
Springer
14 years 1 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter