Sciweavers

1977 search results - page 347 / 396
» internet 2008
Sort
View
ISCAS
2008
IEEE
183views Hardware» more  ISCAS 2008»
15 years 11 months ago
Optimal rate allocation for scalable video multicast over WiMAX
—The IEEE 802.16 standard (commonly known as WiMAX), which has been proposed as a new wireless broadband standard, is capable of delivering very high data rate and covering wide ...
Hsin-Yu Chi, Chia-Wen Lin, Yung-Chang Chen, Chih-M...
ISM
2008
IEEE
119views Multimedia» more  ISM 2008»
15 years 11 months ago
Using Exact Locality Sensitive Mapping to Group and Detect Audio-Based Cover Songs
Cover song detection is becoming a very hot research topic when plentiful personal music recordings or performance are released on the Internet. A nice cover song recognizer helps...
Yi Yu, J. Stephen Downie, Fabian Mörchen, Lei...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 11 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
15 years 11 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
ISSRE
2008
IEEE
15 years 10 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...