Sciweavers

680 search results - page 130 / 136
» Locating Hidden Servers
Sort
View
CCS
2004
ACM
14 years 2 months ago
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against bu er over ow attacks. The idea is to introduce arti cial diversity by randomizing the memory location o...
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh...
GROUP
2003
ACM
14 years 2 months ago
Technology for boundaries
This paper presents a study of an organisation, which is undergoing a process transforming organisational and technological boundaries. In particular, we shall look at three kinds...
Susanne Bødker, Jannie Friis Kristensen, Ch...
MOBICOM
2003
ACM
14 years 2 months ago
Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED
Significant TCP unfairness in ad hoc wireless networks has been reported during the past several years. This unfairness results from the nature of the shared wireless medium and ...
Kaixin Xu, Mario Gerla, Lantao Qi, Yantai Shu
SIGCOMM
2003
ACM
14 years 2 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
WSNA
2003
ACM
14 years 2 months ago
Analysis on the redundancy of wireless sensor networks
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain l...
Yong Gao, Kui Wu, Fulu Li