Sciweavers

3089 search results - page 359 / 618
» services 2008
Sort
View
121
Voted
CN
2006
56views more  CN 2006»
15 years 4 months ago
Maximizing remote work in flooding-based peer-to-peer systems
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
Qixiang Sun, Neil Daswani, Hector Garcia-Molina
COMCOM
2006
121views more  COMCOM 2006»
15 years 4 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
COMCOM
2006
103views more  COMCOM 2006»
15 years 4 months ago
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Today's public Wireless LANs are restricted to hotspots. With the current technology, providers can only target a small audience and in turn charge high prices for their serv...
Attila Weyland, Thomas Staub, Torsten Braun
COMPSEC
2006
98views more  COMPSEC 2006»
15 years 4 months ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti
IJBIS
2008
99views more  IJBIS 2008»
15 years 4 months ago
Managing legal risks associated with intellectual property on the web
: Intellectual Property (IP) has taken a prominent place on the web. Today's organisations need to know the ways in which their websites can be the target of costly IP litigat...
Holger M. Kienle, Daniel M. Germán, Scott R...