Sciweavers

411 search results - page 42 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 26 days ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
DSN
2004
IEEE
14 years 12 days ago
Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor Networks
Abstract-- Wireless sensor networks (WSNs) are large collections of resource limited nodes, densely deployed over a landscape. They gather and disseminate local data using multihop...
Patrick Downey, Rachel Cardell-Oliver
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
14 years 3 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
TPDS
2002
117views more  TPDS 2002»
13 years 8 months ago
Gemini: An Optical Interconnection Network for Parallel Processing
Abstract--The Gemini interconnect is a dual technology (optical and electrical) interconnection network designed for use in tightlycoupled multicomputer systems. It consists of a c...
Roger D. Chamberlain, Mark A. Franklin, Ch'ng Shi ...
IADIS
2004
13 years 10 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu