Sciweavers

1518 search results - page 231 / 304
» Point-Casting Service in Wireless Networks
Sort
View
ICOIN
2007
Springer
14 years 4 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
INFOCOM
2007
IEEE
14 years 4 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
PERCOM
2005
ACM
14 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
VTC
2010
IEEE
201views Communications» more  VTC 2010»
13 years 8 months ago
iTETRIS: Adaptation of ITS Technologies for Large Scale Integrated Simulation
1 —the European Union (EU) Framework Program 7 (FP7) funded project, iTETRIS [1] (An Integrated Wireless and Traffic Platform for Real-Time Road Traffic Management Solutions) tar...
Vineet Kumar, Lan Lin, Daniel Krajzewicz, Fatma Hr...
ISCAS
2005
IEEE
130views Hardware» more  ISCAS 2005»
14 years 3 months ago
Smart bio-laboratories of the future
Abstract— Recent advances in genomic research and biotechnology have led to an increased level of technological sophistication in today’s biology laboratories. With the promisi...
See-Kiong Ng