Sciweavers

97 search results - page 2 / 20
» On the Design and Use of Internet Sinks for Network Abuse Mo...
Sort
View
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 5 months ago
Verifiable Network-Performance Measurements
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a con...
Katerina J. Argyraki, Petros Maniatis, Ankit Singl...
JMS
2008
83views more  JMS 2008»
13 years 4 months ago
Monitoring of Physiological Parameters from Multiple Patients Using Wireless Sensor Network
This paper presents a wireless sensor network system that has the capability to monitor physiological parameters from multiple patient bodies. The system uses the Medical Implant C...
Mehmet R. Yuce, Peng Choong Ng, Jamil Y. Khan
ACSAC
2009
IEEE
13 years 11 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
JSAC
2010
166views more  JSAC 2010»
13 years 3 months ago
Phero-trail: a bio-inspired location service for mobile underwater sensor networks
A SEA Swarm (Sensor Equipped Aquatic Swarm) moves as a group with water current and enables 4D (space and time) monitoring of local underwater events such as contaminants and intr...
Luiz Filipe M. Vieira, Uichin Lee, Mario Gerla
SIGMETRICS
2002
ACM
133views Hardware» more  SIGMETRICS 2002»
13 years 4 months ago
On the stability of network distance estimation
Estimating end-to-end Internet distance can benefit many applications and services, such as efficient overlay construction, overlay routing and location, and peer-topeer systems. ...
Yan Chen, Khian Hao Lim, Randy H. Katz, Chris Over...