Sciweavers

1777 search results - page 346 / 356
» Programming Cryptographic Protocols
Sort
View
MOBICOM
2004
ACM
14 years 2 months ago
Exploiting medium access diversity in rate adaptive wireless LANs
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
MSWIM
2004
ACM
14 years 2 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...
IFIP
2004
Springer
14 years 1 months ago
A Framework for End-to-End QoS Context Transfer in Mobile IPv6
Providing Quality-of-Service (QoS) guarantees and mobility support for Internet devices has become a hot research topic in the Next Generation Internet research, since mobile compu...
Chuda Liu, Depei Qian, Yi Liu, Kaiping Xiao
CLUSTER
2003
IEEE
14 years 1 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
CCS
2003
ACM
14 years 1 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...