Sciweavers

537 search results - page 70 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
82
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 10 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
TELSYS
2010
147views more  TELSYS 2010»
14 years 5 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
TRIDENTCOM
2010
IEEE
14 years 8 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
SASN
2004
ACM
15 years 4 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
WMASH
2003
ACM
15 years 4 months ago
An end-to-end multi-path smooth handoff scheme for stream media
In the near future, wide variety of wireless networks will be merged into the Internet and allow users to continue their application with higher degree of mobility. In such enviro...
Yi Pan, Meejeong Lee, Jaime Bae Kim, Tatsuya Suda