Sciweavers

1014 search results - page 168 / 203
» Distributed Algorithms for Attack Localization in All-Optica...
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
WWW
2006
ACM
14 years 9 months ago
WAP5: black-box performance debugging for wide-area systems
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the c...
Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogu...
WMASH
2004
ACM
14 years 2 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
EMNETS
2007
14 years 27 days ago
Acoustic laptops as a research enabler
The Acoustic ENSBox [1] is an embedded platform which enables practical distributed acoustic sensing by providing integrated hardware and software support in a single platform. It...
Michael Allen, Lewis Girod, Deborah Estrin
IWOCA
2010
Springer
232views Algorithms» more  IWOCA 2010»
13 years 3 months ago
Computing Role Assignments of Proper Interval Graphs in Polynomial Time
A homomorphism from a graph G to a graph R is locally surjective if its restriction to the neighborhood of each vertex of G is surjective. Such a homomorphism is also called an R-r...
Pinar Heggernes, Pim van 't Hof, Daniël Paulu...