Sciweavers

7891 search results - page 1461 / 1579
» Local Area Networking
Sort
View
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 5 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
ISPDC
2008
IEEE
14 years 5 months ago
Token Loss Detection for Random Walk based Algorithm
Self-stabilizing token circulation algorithms are not always adapted for dynamic networks. Random walks are well known to play a crucial role in the design of randomized algorithm...
Thibault Bernard, Alain Bui, Devan Sohier
NOMS
2008
IEEE
141views Communications» more  NOMS 2008»
14 years 5 months ago
Detecting BGP anomalies with wavelet
—In this paper, we propose a BGP anomaly detection framework called BAlet that delivers both temporal and spatial localization of the potential anomalies. It requires only a simp...
Jianning Mai, Lihua Yuan, Chen-Nee Chuah
PIMRC
2008
IEEE
14 years 5 months ago
Information-theoretic implications of constrained cooperation in simple cellular models
—Recent information theoretic results on cooperation in cellular systems are reviewed, addressing both multicell processing (cooperation among base stations) and relaying (cooper...
Shlomo Shamai, Osvaldo Simeone, Oren Somekh, Amich...
SASO
2008
IEEE
14 years 5 months ago
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems
Market-based mechanisms can be used to coordinate self-interested multi-robot systems in fully distributed environments, where by self-interested we mean that each robot agent att...
MyungJoo Ham, Gul A. Agha
« Prev « First page 1461 / 1579 Last » Next »