Sciweavers

265 search results - page 35 / 53
» Security Patterns for Voice over IP Networks
Sort
View
MOBICOM
2004
ACM
14 years 3 months ago
The changing usage of a mature campus-wide wireless network
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to und...
Tristan Henderson, David Kotz, Ilya Abyzov
INFOCOM
2010
IEEE
13 years 8 months ago
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta
ESORICS
2000
Springer
14 years 1 months ago
A Full Bandwidth ATM Firewall
The ATM technology has been specified to provide users with the ability to request quality of service (QoS) for their applicatio ns and to enable high speed communications. Howeve...
Olivier Paul, Maryline Laurent, Sylvain Gombault
WWW
2009
ACM
14 years 5 months ago
A P2P based distributed services network for next generation mobile internet communications
In this poster, we present a novel P2P (Peer to Peer) based distributed services network (DSN), which is a next generation operable and manageable distributed core network archite...
Yang Li, Yi-Chuan Wu, Jian-Ying Zhang, Jin Peng, H...
WCNC
2008
IEEE
14 years 4 months ago
Adaptive Tuning of MIMO-Enabled 802.11e WLANs with Network Utility Maximization
— The IEEE 802.11-based wireless local area networks (WLANs) are widely used for high-speed wireless data access. With the recent 802.11e quality-of-service (QoS) extension, real...
Yuxia Lin, Vincent W. S. Wong