Sciweavers

3039 search results - page 538 / 608
» A Network Positioning System for the Internet
Sort
View
CCS
2005
ACM
15 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
DCC
2009
IEEE
15 years 10 months ago
Multi Level Multiple Descriptions
Multiple Description (MD) source coding is a method to overcome unexpected information loss in a diversity system such as the internet, or a wireless network. While classic MD cod...
Tal A. Beery, Ram Zamir
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 4 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
GLOBECOM
2007
IEEE
15 years 4 months ago
Perceptual Quality in P2P Multi-Source Video Streaming Policies
— This paper explores a key aspect of the problem of sending real-time video over the Internet using a P2P architecture. The main difficulty with such a system is the high dynam...
Héctor Cancela, Pablo Rodríguez-Bocc...
IROS
2007
IEEE
114views Robotics» more  IROS 2007»
15 years 4 months ago
Design and control of a second-generation hyper-redundant mechanism
— We present a refined, second-generation design, construction and integration, of a compact hyper-redundant snakelike robot, called “Woodstock.” This robot has substantial a...
H. Ben Brown, Michael Schwerin, Elie A. Shammas, H...