Sciweavers

1342 search results - page 192 / 269
» Effectivity and effective continuity of multifunctions
Sort
View
JNW
2006
111views more  JNW 2006»
13 years 7 months ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki
JPDC
2006
87views more  JPDC 2006»
13 years 7 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
LMCS
2006
79views more  LMCS 2006»
13 years 7 months ago
Computably Based Locally Compact Spaces
tract Stone Duality) is a re-axiomatisation of general topology in which the topology on a space is treated, not as an infinitary lattice, but as an exponential object of the same...
Paul Taylor 0002
MICRO
2006
IEEE
88views Hardware» more  MICRO 2006»
13 years 7 months ago
SWICH: A Prototype for Efficient Cache-Level Checkpointing and Rollback
Low-overhead checkpointing and rollback is a popular technique for fault recovery. While different approaches are possible, hardware-supported checkpointing and rollback at the ca...
Radu Teodorescu, Jun Nakano, Josep Torrellas