Sciweavers

461 search results - page 26 / 93
» Protecting Transportation Infrastructure
Sort
View
AIMS
2009
Springer
14 years 2 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
PCM
2001
Springer
119views Multimedia» more  PCM 2001»
14 years 2 months ago
IP Traffic Monitoring: An Overview and Future Considerations
An overview on emerging IP traffic monitoring is presented. Important parameters to characterize the traffic, network and QoS, are discussed. The infrastructure and methodology to ...
Dong Wei, Nirwan Ansari
ICDCS
2003
IEEE
14 years 3 months ago
Protecting BGP Routes to Top Level DNS Servers
—The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet...
Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Dan...
COLCOM
2007
IEEE
13 years 11 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...
ISSA
2004
13 years 11 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa