Sciweavers

376 search results - page 63 / 76
» Hardware-Assisted Fast Routing
Sort
View
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
14 years 4 months ago
On the Development of an Internetwork-Centric Defense for Scanning Worms
Studies of worm outbreaks have found that the speed of worm propagation makes manual intervention ineffective. Consequently, many automated containment mechanisms have been propos...
Scott E. Coull, Boleslaw K. Szymanski
CCS
2007
ACM
14 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
14 years 3 months ago
Inductance extraction for general interconnect structures
As the operation frequency reaches gigahertz in very deep-submicron designs, the effect of on-chip inductance on circuit performance can no longer be neglected. Therefore, it is d...
Chun-Ying Lai, Shyh-Kang Jeng, Yao-Wen Chang, Chia...
ISCC
2006
IEEE
14 years 3 months ago
An Optimized Peer-to-Peer Overlay Network for Service Discovery
In this paper, we propose DINPeer, an optimized peer-to-peer (P2P) overlay network for service discovery by overcoming limitations in current multicast discovery approaches and P2...
H. Q. Guo, D. Q. Zhang, Lek Heng Ngoh, Wai-Choong ...
SP
2006
IEEE
14 years 3 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson