Sciweavers

517 search results - page 101 / 104
» INSEE: An Interconnection Network Simulation and Evaluation ...
Sort
View
CCS
2003
ACM
14 years 16 days ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
APSCC
2008
IEEE
14 years 1 months ago
Hop-by-Hop TCP over MANET
In a MANET environment, communication links are unstable due to various reasons. Error rate is higher and bandwidth is smaller than fixed networks. Running conventional TCP protoco...
Yao-Nan Lien, Yi-Fan Yu
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
13 years 11 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
ACSAC
2003
IEEE
13 years 11 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
ICHIM
2001
190views more  ICHIM 2001»
13 years 8 months ago
Chromatic Adaptation Post-Filtering in Image Synthesis Reproduction of Ancient Building for Restoration Support
Within the field of cultural heritage restoration, experts are interested in the analysis of data describing the condition and history of ancient monuments. Data are usually distr...
Maurizio Rossi, Daniele Marini, Alessandro Rizzi