Sciweavers

642 search results - page 98 / 129
» Detecting Spoofed Packets
Sort
View
IMC
2009
ACM
15 years 11 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
142
Voted
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 11 months ago
Progressive Route Calculation Protocol for Wireless Mesh Networks
—Although network-wide flooding in reactive routing protocols like AODV [1] facilitates the discovery of optimal routes, they engender large control overhead. Some efficient floo...
Xuhui Hu, Myung J. Lee, Tarek N. Saadawi
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
15 years 11 months ago
How to scalably and accurately skip past streams
Data stream methods look at each new item of the stream, perform a small number of operations while keeping a small amount of memory, and still perform muchneeded analyses. Howeve...
Supratik Bhattacharyya, André Madeira, S. M...
ESORICS
2007
Springer
15 years 10 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
159
Voted
ICPP
2006
IEEE
15 years 10 months ago
Improving Spatial Reuse with Collision-Aware DCF in Mobile Ad Hoc Networks
—Carrier sensing is a medium access method widely adopted in wireless communication to protect data transfers from interference. For example, Distributed Coordination Function (D...
Lubo Song, Chansu Yu