Sciweavers

847 search results - page 143 / 170
» Monitoring the connectivity of a grid
Sort
View
IMC
2003
ACM
14 years 26 days ago
On the number of distributed measurement points for network tomography
Internet topology information is only made available in aggregate form by standard routing protocols. Connectivity information and latency characteristicsmust therefore be inferre...
Joseph Douglas Horton, Alejandro López-Orti...
SACMAT
2003
ACM
14 years 26 days ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
ICRA
2002
IEEE
116views Robotics» more  ICRA 2002»
14 years 16 days ago
Staying Alive: A Docking Station for Autonomous Robot Recharging
—Autonomous mobile robots are constrained in their long-term functionality due to a limited on-board power supply. Typically, rechargeable batteries are utilized that may only pr...
Milo C. Silverman, Dan Nies, Boyoon Jung, Gaurav S...
INFOCOM
2002
IEEE
14 years 16 days ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ITCC
2002
IEEE
14 years 15 days ago
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes
Audio watermarking has become an important technology for recording and advertisement industry. Today’s embedding and detection strategies often rely on digital or at least high...
Martin Steinebach, Andreas Lang, Jana Dittmann, Ch...