Sciweavers

430 search results - page 25 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
13 years 7 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
ICDCS
2010
IEEE
13 years 12 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
AUSFORENSICS
2003
13 years 9 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb
VIIP
2001
13 years 9 months ago
Boolean 2D Shape Similarity for Surface Reconstruction
Surface reconstruction problem (SRP) from planar samples has been traditionally approached by either (i) using local proximity between data points in adjacent layers, or by (ii) c...
Oscar E. Ruiz, Carlos A. Cadavid
TMC
2008
132views more  TMC 2008»
13 years 7 months ago
A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
In this paper, we investigate the issue of per-station fairness in TCP over IEEE 802.11-compliant wireless local area networks (WLANs), especially in Wi-Fi hot spots. It is asserte...
Eun-Chan Park, Dong-Young Kim, Hwangnam Kim, Chong...