Sciweavers

1709 search results - page 227 / 342
» networks 2000
Sort
View
LISA
2000
13 years 10 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
DATE
2000
IEEE
103views Hardware» more  DATE 2000»
14 years 1 months ago
Protocol Stack-Based Telecom-Emulator
The paper describes the concept and implementation of a telecom emulator that features both recon gurability and high-speed processing. The emulator can be easily transmuted into ...
Takahiro Murooka, Toshiaki Miyazaki
ACSAC
2000
IEEE
14 years 1 months ago
On Computer Viral Infection and the Effect of Immunization
Viruses remain a significant threat to modern networked computer systems. Despite the best efforts of those who develop anti-virus systems, new viruses and new types of virus that...
Chenxi Wang, John C. Knight, Matthew C. Elder
HPDC
2000
IEEE
14 years 1 months ago
2K: A Distributed Operating System for Dynamic Heterogeneous Environments
The first decades of the new millennium will witness an explosive growth in the number and diversity of networked devices and portals. We foresee high degrees of mobility, hetero...
Fabio Kon, Roy H. Campbell, M. Dennis Mickunas, Kl...
ICMCS
2000
IEEE
91views Multimedia» more  ICMCS 2000»
14 years 1 months ago
Streaming Video with Optimized Reconstruction-Based DCT
One fundamental problem with streaming video data over unreliable IP networks is that packets may be dropped or arrive too late for real-time playback. Traditional error-control s...
Xiao Su, Benjamin W. Wah