Sciweavers

33 search results - page 6 / 7
» ase 2008
Sort
View
CN
2008
128views more  CN 2008»
13 years 9 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
IJSN
2007
129views more  IJSN 2007»
13 years 9 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
CCR
2004
86views more  CCR 2004»
13 years 9 months ago
On the scaling of congestion in the internet graph
As the Internet grows in size, it becomes crucial to understand how the speeds of links in the network must improve in order to sustain the pressure of new end-nodes being added e...
Aditya Akella, Shuchi Chawla, Arvind Kannan, Srini...
CN
2004
109views more  CN 2004»
13 years 9 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
TCSV
2002
125views more  TCSV 2002»
13 years 9 months ago
Object-based video abstraction for video surveillance systems
ased Video Abstraction for Video Surveillance Systems Changick Kim, Member, IEEE, and Jenq-Neng Hwang, Fellow, IEEE Key frames are the subset of still images which best t the conte...
Changick Kim, Jenq-Neng Hwang