Sciweavers

6025 search results - page 1086 / 1205
» Flexibility in Service Processes
Sort
View
104
Voted
LCN
2005
IEEE
15 years 9 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
127
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Personal AP Protocol for Mobility Management in IEEE 802.11 Systems
—In mobile wireless systems, the quest to support delay-stringent multimedia applications challenges most existing solutions to the mobility support and traffic management proble...
Lei Zan, Jidong Wang, Lichun Bao
131
Voted
RTCSA
2005
IEEE
15 years 9 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
158
Voted
WETICE
2005
IEEE
15 years 9 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
135
Voted
SAC
2005
ACM
15 years 9 months ago
Knowledge based approach to semantic composition of teams in an organization
Finding rapidly suitable experts in an organization to compose a team able to solve specific tasks is a typical problem in large consulting firms. In this paper we present a Des...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
« Prev « First page 1086 / 1205 Last » Next »