Sciweavers

1450 search results - page 231 / 290
» Congestible services and network effects
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
A Context Middleware Based on Sensor and RFID Information
Pervasive computing environments have traditionally used distributed sensors to gather user context. EPC (Electronic Product Code) information extracted from RFID tags could addit...
Daeyoung Kim, Tomás Sánchez Ló...
MOBIHOC
2005
ACM
15 years 9 months ago
Timed grid routing (TIGR) bites off energy
Energy efficiency and collisions avoidance are both critical properties to increase the lifetime and effectiveness of wireless networks. This paper proposes a family of algorithms...
Roy Friedman, Guy Korland
DSN
2008
IEEE
15 years 4 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
PIMRC
2008
IEEE
15 years 4 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
HPCC
2007
Springer
15 years 4 months ago
A Proactive Method for Content Distribution in a Data Indexed DHT Overlay
In a data-indexed DHT overlay network, published data annotations form distributed databases. Queries are distributed to these databases in a nonuniform way. Constructing content d...
Bassam A. Alqaralleh, Chen Wang, Bing Bing Zhou, A...