Sciweavers

2503 search results - page 331 / 501
» Building Computer Network Attacks
Sort
View
DCOSS
2005
Springer
15 years 7 months ago
Design of Adaptive Overlays for Multi-scale Communication in Sensor Networks
In wireless sensor networks, energy and communication bandwidth are precious resources. Traditionally, layering has been used as a design principle for network stacks; hence routin...
Santashil PalChaudhuri, Rajnish Kumar, Richard G. ...
PERCOM
2008
ACM
16 years 1 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart
IMC
2007
ACM
15 years 3 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
WMTE
2008
IEEE
15 years 8 months ago
Context-Aware Writing in Ubiquitous Learning Environments
With the popularization of the wireless network, and the progress of mobile computing technology, the efficiency of the hand-held device is better, and its applications are wider....
Tzung-Shi Chen, Cheng-Sian Chang, Jeng-Shian Lin, ...
128
Voted
AINA
2007
IEEE
15 years 8 months ago
Convergent Online Charging for Context-Aware Mobile Services
Personalized and context-aware services are of high interest for Mobile Network Operators (MNOs) to keep existing and win new subscribers. Although such services are already avail...
Frank Bormann, Stephan Flake, Jürgen Tacken