Sciweavers

CN
2004
124views more  CN 2004»
13 years 4 months ago
DDoS attacks and defense mechanisms: classification and state-of-the-art
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in today
Christos Douligeris, Aikaterini Mitrokotsa
CN
2004
63views more  CN 2004»
13 years 4 months ago
Policy-enabled mechanisms for feature interactions: reality, expectations, challenges
: This paper is based on the discussion during a panel that took place at the 7th Workshop on Feature Interactions in Telecommunications and Software Systems in Ottawa, Canada, Jun...
Petre Dini, Alexander Clemm, Tom Gray, Fuchun Jose...
CN
2004
127views more  CN 2004»
13 years 4 months ago
Intermediary infrastructures for the World Wide Web
Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In th...
Marios D. Dikaiakos
CN
2004
136views more  CN 2004»
13 years 4 months ago
Managing service level agreements in Premium IP networks: a business-oriented approach
This paper presents a market-enabling framework where users, content providers and network operators can interact in the seamless, transparent sale and delivery of a wide range of...
Salvatore D'Antonio, Maurizio D'Arienzo, Marcello ...
CN
2004
104views more  CN 2004»
13 years 4 months ago
Reducing power consumption and enhancing performance by direct slave-to-slave and group communication in Bluetooth WPANs
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access c...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....
CN
2004
128views more  CN 2004»
13 years 4 months ago
A smooth handoff scheme using IEEE802.11 triggers - design and implementation
This paper proposes a handoff scheme in a wireless access network where IEEE802.11 is used as link layer protocol and Mobile IP as network layer protocol. The scheme uses triggers...
Peter De Cleyn, Nik Van den Wijngaert, Lloren&cced...
CN
2004
108views more  CN 2004»
13 years 4 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
CN
2004
109views more  CN 2004»
13 years 4 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
CN
2004
109views more  CN 2004»
13 years 4 months ago
QoS-aware radio resource management scheme for CDMA cellular networks based on dynamic interference guard margin (IGM)
Efficient radio resource management (RRM) for CDMA-based cellular communication systems using the interference guard margin (IGM) scheme is investigated in this work. Two importan...
Huan Chen, Sunil Kumar, C. C. Jay Kuo
CN
2004
116views more  CN 2004»
13 years 4 months ago
Towards capturing representative AS-level Internet topologies
Abstract--Recent studies concerning the Internet connectivity at the AS level have attracted considerable attention. These studies have exclusively relied on the BGP data from Oreg...
Hyunseok Chang, Ramesh Govindan, Sugih Jamin, Scot...