Sciweavers

2503 search results - page 297 / 501
» Building Computer Network Attacks
Sort
View
APNOMS
2006
Springer
15 years 5 months ago
Delivery and Storage Architecture for Sensed Information Using SNMP
Many researches on context aware computing are carried out around the world. Among them, Context-Toolkit and Semantic Space provide separation of concerns between sensor and applic...
Deokjai Choi, Hongseok Jang, Kugsang Jeong, Punghy...
MMMACNS
2005
Springer
15 years 7 months ago
Networks, Markov Lie Monoids, and Generalized Entropy
The continuous general linear group in n dimensions can be decomposed into two Lie groups: (1) an n(n-1) dimensional ‘Markov type’ Lie group that is defined by preserving the ...
Joseph E. Johnson
94
Voted
IPPS
2008
IEEE
15 years 8 months ago
PROD: Relayed file retrieving in overlay networks
— To share and exchange the files among Internet users, Peerto-Peer (P2P) applications build another layer of overlay networks on top of the Internet Infrastructure. In P2P fil...
Zhiyong Xu, D. Stefanescu, Honggang Zhang, Laxmi N...
127
Voted
AINA
2007
IEEE
15 years 8 months ago
Comparative Evaluation of Converged Service-Oriented Architectures
In this paper we evaluate and compare five commercial off-the-shelf platforms for building converged serviceoriented architectures in an ambient computing environment. To this en...
Davy Preuveneers, Julien Pauty, Dimitri Van Landuy...
CCS
2007
ACM
15 years 8 months ago
Implementing and testing dynamic timeout adjustment as a dos counter-measure
In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queues as potential counter-measures against degradation of service attacks. Previo...
Daniel Boteanu, Edouard Reich, José M. Fern...