Sciweavers

3130 search results - page 610 / 626
» Collusion without communication
Sort
View
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
IJISEC
2007
119views more  IJISEC 2007»
14 years 11 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
JCIT
2007
111views more  JCIT 2007»
14 years 11 months ago
Pedagogical Usability Checklist for ESL/EFL E-learning Websites
It is, thus, not surprising that English education has gained more attention than ever and there also has been a growing amount of interest in learning English online. Although the...
C. J. Lim, S. Lee
CCR
2005
97views more  CCR 2005»
14 years 11 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
CCR
2005
76views more  CCR 2005»
14 years 11 months ago
Simplifying the synthesis of internet traffic matrices
A recent paper [8] presented methods for several steps along the road to synthesis of realistic traffic matrices. Such synthesis is needed because traffic matrices are a crucial i...
Matthew Roughan