Sciweavers

Share
IPCCC
2006
IEEE
9 years 8 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
IPCCC
2006
IEEE
9 years 8 months ago
A survey of PKI components and scalability issues
Adam J. Slagell, Rafael Bonilla, William Yurcik
IPCCC
2006
IEEE
9 years 8 months ago
dRamDisk: efficient RAM sharing on a commodity cluster
Recent work on distributed RAM sharing has largely focused on leveraging low-latency networking technologies to optimize remote memory access. In contrast, we revisit the idea of ...
Vassil Roussev, Golden G. Richard III, Daniel Ting...
IPCCC
2006
IEEE
9 years 8 months ago
A novel queue management mechanism for improving performance of multihop flows in IEEE 802.11s based mesh networks
– Wireless Mesh networks exploit multi-hop wireless communications between Access Points to replace wired infrastructure. However, in multi-hop networks, effective bandwidth decr...
Nagesh Nandiraju, Deepti S. Nandiraju, Dave Cavalc...
IPCCC
2006
IEEE
9 years 8 months ago
A framework for distributed key management schemes in heterogeneous wireless sensor networks
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Kejie Lu, Yi Qian, Jiankun Hu
IPCCC
2006
IEEE
9 years 8 months ago
BGP with an adaptive minimal route advertisement interval
The duration of the Minimal Route Advertisement Interval (MRAI) and the implementation of MRAI timers have a significant influence on the convergence time of the Border Gateway Pr...
Nenad Laskovic, Ljiljana Trajkovic
IPCCC
2006
IEEE
9 years 8 months ago
Unstructured peer-to-peer session over IP using SIP
— Data and telephone service providers have started considering migration to an IP based environment. This paper presents an unstructured peer-to-peer approach to initiating and ...
Khashayar Khavari, Chuen Liang, Ali Tizghadam, Far...
IPCCC
2006
IEEE
9 years 8 months ago
On capturing and containing E-mail worms
Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage th...
Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, A...
IPCCC
2006
IEEE
9 years 8 months ago
Caching of interactive multiple choice MPEG-4 presentations
On-demand access to remote multimedia content via the Internet is becoming increasingly popular. Applications like Video on Demand and News on Demand are increasingly based on str...
Carsten Griwodz, Frank T. Johnsen, Simen Rekkedal,...
IPCCC
2006
IEEE
9 years 8 months ago
Data replication in collaborative sensor network systems
Denis Gracanin, Kevin P. Adams, Mohamed Eltoweissy
books