Sciweavers

889 search results - page 122 / 178
» Problems in Rewriting III
Sort
View
111
Voted
ICNP
2007
IEEE
15 years 10 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
INFOCOM
2007
IEEE
15 years 10 months ago
A Multipath Background Network Architecture
— Background transfers, or transfers that humans do not actively wait on, dominate the Internet today. In today’s best-effort Internet, background transfers can interfere with ...
Ravi Kokku, Aniruddha Bohra, Samrat Ganguly, Arun ...
112
Voted
IPPS
2007
IEEE
15 years 10 months ago
Integrated Risk Analysis for a Commercial Computing Service
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs w...
Chee Shin Yeo, Rajkumar Buyya
101
Voted
IROS
2007
IEEE
111views Robotics» more  IROS 2007»
15 years 10 months ago
Design of a modular snake robot
— Many factors such as size, power, and weight constrain the design of modular snake robots. Meeting these constraints requires implementing a complex mechanical and electrical a...
Cornell Wright III, Aaron Johnson, Aaron Peck, Zac...
115
Voted
CONTEXT
2007
Springer
15 years 9 months ago
Adaptive and Context-aware Scenarios for Technology Enhanced Learning System based on a Didactical Theory and a Hierarchical Tas
Among the main issues of future technology-enhanced learning systems, we can mention the following ones: the ability to reuse learning resources (learning objects, tools and servic...
Jean-Louis Tetchueng, Serge Garlatti, Sylvain Laub...