Sciweavers

418 search results - page 34 / 84
» IP switching - ATM under IP
Sort
View
LFCS
1992
Springer
13 years 11 months ago
Banishing Robust Turing Completeness
This paper proves that "promise classes" are so fragilely structured that they do not robustly (i.e. with respect to all oracles) possess Turinghard sets even in classes...
Lane A. Hemachandra, Sanjay Jain, Nikolai K. Veres...
AINA
2004
IEEE
13 years 11 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
CONEXT
2008
ACM
13 years 9 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
UIST
2009
ACM
14 years 2 months ago
Contact area interaction with sliding widgets
We show how to design touchscreen widgets that respond to a finger’s contact area. In standard touchscreen systems a finger often appears to touch several screen objects, but ...
Tomer Moscovich
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 2 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt