Sciweavers

1966 search results - page 378 / 394
» The Distributed Virtual Windtunnel
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 4 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
INFOCOM
2008
IEEE
14 years 4 months ago
Turbo King: Framework for Large-Scale Internet Delay Measurements
—Distance estimation and topological proximity in the Internet have recently emerged as important problems for many distributed applications [1], [10], [11], [19], [29], [31], [4...
Derek Leonard, Dmitri Loguinov
NOMS
2008
IEEE
14 years 4 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
SECON
2008
IEEE
14 years 4 months ago
Coordinated Locomotion of Mobile Sensor Networks
Stationary wireless sensor networks (WSNs) fail to scale when the area to be monitored is open (i.e borderless) and the physical phenomena to be monitored may migrate through a la...
Seokhoon Yoon, Onur Soysal, Murat Demirbas, Chunmi...
ECRTS
2007
IEEE
14 years 4 months ago
A Delay Composition Theorem for Real-Time Pipelines
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from the execution times of higher-priority jobs that preempt...
Praveen Jayachandran, Tarek F. Abdelzaher