Sciweavers

1344 search results - page 219 / 269
» Designing High Performance Enterprise Wi-Fi Networks
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 3 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
JIPS
2006
59views more  JIPS 2006»
14 years 11 months ago
A Light-weight and Dynamically Reconfigurable RMON Agent System
: A RMON agent system, which locates on a subnet, collects the network traffic information for management by retrieving and analyzing all of the packets on the subnet. The RMON age...
Jun-Hyung Lee, Zinwon Park, Myung-Kyun Kim
CIKM
2010
Springer
14 years 10 months ago
Towards a provenance framework for sub-image processing for astronomical data
While there has been advances in observational equipment that generate huge high quality images, the processing of these images remains a major bottleneck. We show that provenance...
Johnson Mwebaze, John McFarland, Danny Booxhorn, E...
AOSD
2005
ACM
15 years 4 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
MSWIM
2009
ACM
15 years 6 months ago
Directional neighbor discovery in 60 GHz indoor wireless networks
The unlicensed 60 GHz band brings the promise of multi-gigabit data rates to support new applications such as high definition video over wireless links. Signal propagation in the...
Jianxia Ning, Tae-Suk Kim, Srikanth V. Krishnamurt...