Sciweavers

2715 search results - page 514 / 543
» Network bucket testing
Sort
View
CACM
1998
127views more  CACM 1998»
13 years 7 months ago
The Virtual Reality Modeling Language and Java
Abstract. The Virtual Reality Modeling Language (VRML) and Java provide a standardized, portable and platformindependent way to render dynamic, interactive 3D scenes across the Int...
Donald P. Brutzman
ITIIS
2010
172views more  ITIIS 2010»
13 years 6 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
SACMAT
2010
ACM
13 years 6 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
TMA
2010
Springer
120views Management» more  TMA 2010»
13 years 5 months ago
DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections
Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the...
Antonio Barbuzzi, Gennaro Boggia, Luigi Alfredo Gr...
MOBISYS
2011
ACM
12 years 10 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...