Sciweavers

5324 search results - page 944 / 1065
» Internet Security Protocols
Sort
View
INFOCOM
2002
IEEE
14 years 24 days ago
Impromptu Measurement Infrastructures using RTP
— Dedicated infrastructures for end-to-end measurements are complex to deploy and manage. Equipment cost, the requirements for reporting bandwidth, and the administrative diversi...
Ramón Cáceres, Nick G. Duffield, Tim...
INFOCOM
2002
IEEE
14 years 24 days ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ISCAS
2002
IEEE
94views Hardware» more  ISCAS 2002»
14 years 24 days ago
Video transport over ad-hoc networks using multiple paths
Enabling video transport over ad-hoc networks is more challenging than over other wireless networks because a connection path in an ad-hoc network is highly error-prone and a path...
Shunan Lin, Yao Wang, Shiwen Mao, Shivendra S. Pan...
MSE
2002
IEEE
179views Hardware» more  MSE 2002»
14 years 24 days ago
A SOAP-Oriented Component-Based Framework Supporting Device-Independent Multimedia Web Services
A web service is a programmable web application accessible using standard Internet protocols. A threelayer architecture has been suggested for web services: service providers, ser...
Jia Zhang, Jen-Yao Chung
OTM
2009
Springer
14 years 13 days ago
Optimizing Data Management in Grid Environments
Grids currently serve as platforms for numerous scientific as well as business applications that generate and access vast amounts of data. In this paper, we address the need for e...
Antonis Zissimos, Katerina Doka, Antony Chazapis, ...