Sciweavers

1272 search results - page 199 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 8 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
IEEESCC
2010
IEEE
15 years 8 months ago
Dynamic Composition of Services in Sensor Networks
Abstract—Service modeling and composition is a fundamental method for offering advanced functionality by combining a set of primitive services provided by the system. Unlike in t...
Sahin Cem Geyik, Boleslaw K. Szymanski, Petros Zer...
FAST
2010
15 years 6 months ago
Provenance for the Cloud
The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is alread...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....
MOBISYS
2010
ACM
15 years 6 months ago
Docx2Go: collaborative editing of fidelity reduced documents on mobile devices
Docx2Go is a new framework to support editing of shared documents on mobile devices. Three high-level requirements influenced its design -- namely, the need to adapt content, espe...
Krishna P. N. Puttaswamy, Catherine C. Marshall, V...
AINA
2008
IEEE
15 years 6 months ago
Disaster Communication Network by Combination of Different Wireless LANs
So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
Kazuo Takahata, Shinya Takada, Yoshitaka Shibata