Sciweavers

ICDCSW
2005
IEEE
14 years 6 months ago
On Introducing Location Awareness in Publish-Subscribe Middleware
Having the possibility of routing messages only toward specific areas or subscribing to messages originating in specific locations seems natural when a publish-subscribe model o...
Gianpaolo Cugola, Jose Enrique Munoz de Cote
ICDCSW
2005
IEEE
14 years 6 months ago
A Distributed Architecture for Management and Retrieval of Extended Points of Interest
This paper presents a distributed architecture for the management and retrieval of particular objects called POIsmarts. POIsmarts can be considered as the convergence between virt...
Claudio Bettini, Nicolò Cesa-Bianchi, Danie...
ICDCSW
2005
IEEE
14 years 6 months ago
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
Theorists and practitioners have fairly different perspectives on how wireless broadcast works. Theorists think about synchrony; practitioners think about backoff. Theorists assum...
Gregory Chockler, Murat Demirbas, Seth Gilbert, Na...
ICDCSW
2005
IEEE
14 years 6 months ago
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming
The widespread popularity of roaming wireless devices with limited and heterogeneous capabilities is enabling new challenging deployment scenarios for multimedia streaming in wire...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
ICDCSW
2005
IEEE
14 years 6 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ICDCSW
2005
IEEE
14 years 6 months ago
IASO - An Activity-Based Computing Platform for Wearable Computing
Displaying and navigating complex information on wearable computers is very different from accessing the same information while sitting at your desk. Limitations in hardware, scre...
Jakob E. Bardram, Jonathan Bunde-Pedersen
ICDCSW
2005
IEEE
14 years 6 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang
ICDCSW
2005
IEEE
14 years 6 months ago
Performance Comparison of Distributed Architectures for Content Adaptation and Delivery of Web Resources
The increasing popularity of heterogeneous Webenabled devices and wired/wireless connections motivates the diffusion of content adaptation services that enrich the traditional Web...
Claudia Canali, Valeria Cardellini, Michele Colaja...
ICDCSW
2005
IEEE
14 years 6 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICDCSW
2005
IEEE
14 years 6 months ago
A User-Driven Adaptation Strategy for Mobile Video Streaming Applications
Recent advances in mobile and wireless technologies make possible the bear of new services and the extension of traditional ones in new scenarios. Adaptation strategies play a cru...
Domenico Cotroneo, Generoso Paolillo, C. Pirro, St...