Sciweavers

5435 search results - page 1029 / 1087
» Informed Detection Revisited
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
INFOCOM
2009
IEEE
15 years 11 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
INFOCOM
2009
IEEE
15 years 11 months ago
PHY Aided MAC - A New Paradigm
—Network protocols have traditionally been designed using a layered method in part because it is easier to implement some portions of network protocols in software and other port...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
INFOCOM
2009
IEEE
15 years 11 months ago
Measuring Complexity and Predictability in Networks with Multiscale Entropy Analysis
—We propose to use multiscale entropy analysis in characterisation of network traffic and spectrum usage. We show that with such analysis one can quantify complexity and predict...
Janne Riihijärvi, Matthias Wellens, Petri M&a...
ISMAR
2009
IEEE
15 years 11 months ago
Real-time in-situ visual feedback of task performance in mixed environments for learning joint psychomotor-cognitive tasks
This paper proposes an approach to mixed environment training of manual tasks requiring concurrent use of psychomotor and cognitive skills. To train concurrent use of both skill s...
Aaron Kotranza, D. Scott Lind, Carla M. Pugh, Benj...
« Prev « First page 1029 / 1087 Last » Next »