Sciweavers

CN
2007
73views more  CN 2007»
13 years 4 months ago
Evaluation of a low-rate DoS attack against iterative servers
Gabriel Maciá-Fernández, Jesú...
CN
2007
116views more  CN 2007»
13 years 4 months ago
Joint call and packet QoS in cellular packet networks
This paper proposes a novel call admission control scheme capable of providing a combination of call and packet level quality of service requirements in cellular packet networks. ...
Majid Ghaderi, Raouf Boutaba, Gary W. Kenward
CN
2007
80views more  CN 2007»
13 years 4 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CN
2007
142views more  CN 2007»
13 years 4 months ago
Performance modeling of epidemic routing
In this paper, we develop a rigorous, unified framework based on ordinary differential equations (ODEs) to study epidemic routing and its variations. These ODEs can be derived a...
Xiaolan Zhang, Giovanni Neglia, James F. Kurose, D...
CN
2007
112views more  CN 2007»
13 years 4 months ago
Capacity analysis and MAC enhancement for UWB broadband wireless access networks
We analyze the capacity of ultra-wide band (UWB) wireless access networks supporting multimedia services by calculating the number of multimedia connections that can be supported ...
Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai
CN
2007
137views more  CN 2007»
13 years 4 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
CN
2007
76views more  CN 2007»
13 years 4 months ago
A practical and robust inter-domain marking scheme for IP traceback
A practical and robust inter-domain marking scheme for IP traceback is proposed. We first identify six drawbacks of Probabilistic Packet Marking (PPM), and then contrive a synerg...
Zhiqiang Gao, Nirwan Ansari
CN
2007
110views more  CN 2007»
13 years 4 months ago
Stability of FIFO networks under adversarial models: State of the art
Network stability is an important issue that has attracted the attention of many researchers in recent years. Such interest comes from the need to ensure that, as the system runs ...
Vicent Cholvi, Juan Echagüe
CN
2007
95views more  CN 2007»
13 years 4 months ago
A survey on emerging broadband wireless access technologies
Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize em...
Mehmet S. Kuran, Tuna Tugcu