Sciweavers

1972 search results - page 37 / 395
» connection 2008
Sort
View
VIROLOGY
2008
68views more  VIROLOGY 2008»
13 years 8 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...
SIAMCOMP
2010
120views more  SIAMCOMP 2010»
13 years 6 months ago
Edge Disjoint Paths in Moderately Connected Graphs
Abstract. We study the Edge Disjoint Paths (EDP) problem in undirected graphs: Given a graph G with n nodes and a set T of pairs of terminals, connect as many terminal pairs as pos...
Satish Rao, Shuheng Zhou
ICC
2008
IEEE
166views Communications» more  ICC 2008»
14 years 2 months ago
Multi-Initiator Connected Dominating Set Construction for Mobile Ad Hoc Networks
— The connected dominating set (CDS) has been extensively used for routing and broadcast in mobile ad hoc networks. While existing CDS protocols are successful in constructing CD...
Kazuya Sakai, Fangyang Shen, Kyoung Min Kim, Min-T...
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 2 months ago
Providing End-to-End Connectivity to SIP User Agents Behind NATs
— The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits...
Mario Baldi, Luca De Marco, Fulvio Risso, Livio To...
IADIS
2003
13 years 9 months ago
Connecting the Real and the Virtual World: How to Measure Digital Cities Impact
The paper introduces the concept of digital city and discusses how to assess a particular project, concerning its success in connecting the real city with its virtual counterpart....
Luis Borges Gouveia