Sciweavers

1302 search results - page 144 / 261
» From Liveness to Promptness
Sort
View
SIGCOMM
2006
ACM
14 years 2 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
ICPADS
2005
IEEE
14 years 1 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment
Applications designed for ubiquitous computing environments need to be coded in a specific way in order to fully realize the benefits of ubiquitous computing. Currently, applicati...
Zahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy...
ACSD
2003
IEEE
151views Hardware» more  ACSD 2003»
14 years 1 months ago
Communicating Transaction Processes
Message Sequence Charts (MSC) have been traditionally used to depict execution scenarios in the early stages of design cycle. MSCs portray inter-process ( inter-object) interactio...
Abhik Roychoudhury, P. S. Thiagarajan
HICSS
2002
IEEE
85views Biometrics» more  HICSS 2002»
14 years 1 months ago
Just What Do the Youth of Today Want? Technology Appropriation by Young People
What do young people want from information and communication technology? Why do they adopt some technologies but reject others? What roles do mobile technologies play in their liv...
Jenny M. Carroll, Steve Howard, Frank Vetere, Jane...