Sciweavers

2106 search results - page 318 / 422
» Specifying C concepts
Sort
View
CONEXT
2006
ACM
14 years 2 months ago
Towards a versatile transport protocol
In the context of a reconfigurable transport protocol, this paper introduces two protocol instances based on the composition and specialisation of the TFRC congestion control and...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
INFOSECCD
2006
ACM
14 years 2 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
IWCMC
2006
ACM
14 years 2 months ago
Multi-hop CDMA cellular networks with power control
The concept of multi-hop CDMA cellular networks has been around for sometime now. It is a widely accepted assumption that using multi-hopping in cellular networks will increase th...
Ayman Radwan, Hossam S. Hassanein
MSWIM
2006
ACM
14 years 2 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
NSPW
2006
ACM
14 years 2 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon