Sciweavers

3910 search results - page 685 / 782
» Analyzing Cross-Connected Networks
Sort
View
ACSAC
2002
IEEE
15 years 10 months ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko
ACSAC
2002
IEEE
15 years 10 months ago
GOSSIB vs. IP Traceback Rumors
Abstract—To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking ...
Marcel Waldvogel
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 10 months ago
Empirical Evidence of the Impacts of Electronic Commerce on Supply Chain Integration in the Telecommunication Equipment Industry
This paper presents an analysis of the impacts of electronic commerce on proactive firms in the connectivity equipment industry. Electronic commerce initiatives identified in the ...
Luc Cassivi, Louis A. Lefebvre, Pierre-Majorique L...
INFOCOM
2002
IEEE
15 years 10 months ago
Fast PDA Synchronization Using Characteristic Polynomial Interpolation
—Modern Personal Digital Assistant (PDA) architectures often utilize a wholesale data transfer protocol known as “slow sync” for synchronizing PDAs with Personal Computers (P...
Ari Trachtenberg, David Starobinski, Sachin Agarwa...
INFOCOM
2002
IEEE
15 years 10 months ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...