Abstract. The default solution for mobile robot communication is RFnetworking, typically based on one of the IEEE 802.11 standards also known as WLAN technology. Radio communicatio...
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...