Sciweavers

Share
AINA
2008
IEEE
10 years 6 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
AINA
2008
IEEE
10 years 6 months ago
Geographical Routing in Intermittently Connected Ad Hoc Networks
In intermittently connected ad hoc networks standard routing protocols like AODV, DSR and GPSR fail since they generally cannot find a contemporaneous path from source to destinat...
Erik Kuiper, Simin Nadjm-Tehrani
AINA
2008
IEEE
10 years 6 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
AINA
2008
IEEE
10 years 6 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
AINA
2008
IEEE
10 years 6 months ago
Developing of an Ontological Focused-Crawler for Ubiquitous Services
This paper proposes the use of several ontological techniques to provide a semantic level solution for a search agent so that it can provide fast, precise, and stable search resul...
Sheng-Yuan Yang
AINA
2008
IEEE
10 years 6 months ago
A Context Aware Service-Oriented Maintenance System for the B2B Sector
Elmar Zeeb, Steffen Prüter, Frank Golatowski,...
AINA
2008
IEEE
10 years 6 months ago
An Analytical Study of Wireless Error Models for Bluetooth Networks
Data transmission over wireless networks is challenging due to the occurrence of burst errors, and packet loss caused by such errors seriously limits the maximum achievable throug...
Hao-Hsiang Hung, Ling-Jyh Chen
AINA
2008
IEEE
10 years 6 months ago
A Multi-Purpose Wireless Network Emulator: QOMET
In this paper we present the design and usage of the multi-purpose wireless network emulator that we develop, QOMET. QOMET implements a two-stage scenario-driven approach to wirel...
Razvan Beuran, Junya Nakata, Takashi Okada, Lan Ti...
AINA
2008
IEEE
10 years 6 months ago
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination
In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predict...
Koichi Miyashita, Tsutomu Terada, Shojiro Nishio
AINA
2008
IEEE
10 years 6 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai
books