Sciweavers

642 search results - page 128 / 129
» Detecting Spoofed Packets
Sort
View
USS
2008
14 years 1 months ago
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
Remote error analysis aims at timely detection and remedy of software vulnerabilities through analyzing runtime errors that occur on the client. This objective can only be achieve...
Rui Wang 0010, XiaoFeng Wang, Zhuowei Li
ICWN
2004
14 years 7 days ago
Fast and Efficient IP Handover in IEEE 802.11 Wireless LANs
: This paper presents an effective and simple solution to the problem of Layer 3 (L3) handover in IEEE 802.11 wireless LANs (WLANs), so as to extend the IP mobility area of 802.11 ...
Ioanna Samprakou, Christos Bouras, Theodore Karoub...
SIGMETRICS
2008
ACM
181views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Counter braids: a novel counter architecture for per-flow measurement
Fine-grained network measurement requires routers and switches to update large arrays of counters at very high link speed (e.g. 40 Gbps). A naive algorithm needs an infeasible amo...
Yi Lu, Andrea Montanari, Balaji Prabhakar, Sarang ...
MONET
2002
162views more  MONET 2002»
13 years 10 months ago
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical c...
Jason Xie, Rajesh R. Talpade, Anthony McAuley, Min...
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 9 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...