Sciweavers

849 search results - page 143 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
ACSAC
2001
IEEE
14 years 13 days ago
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server workloads to cause devastation to the service providers. We propose a distribute...
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John ...
INFOCOM
2007
IEEE
14 years 3 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross
MM
2005
ACM
110views Multimedia» more  MM 2005»
14 years 2 months ago
JADE: jabber-based authoring in distributed environments
We present our initial results in developing a framework for collaborative multimedia authoring tools. This research is motivated by the lack of tools that take into account consu...
Andrew Roczniak, Abdulmotaleb El-Saddik
NCA
2003
IEEE
14 years 2 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
14 years 15 days ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...