Sciweavers

4288 search results - page 780 / 858
» Domesticating Computers and the Internet
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
IPPS
2008
IEEE
15 years 6 months ago
A Hybrid MPI design using SCTP and iWARP
Abstract— Remote Direct Memory Access (RDMA) and pointto-point network fabrics both have their own advantages. MPI middleware implementations typically use one or the other, howe...
Mike Tsai, Brad Penoff, Alan Wagner
LCN
2008
IEEE
15 years 6 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
NCA
2008
IEEE
15 years 6 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
BROADNETS
2007
IEEE
15 years 6 months ago
High-speed wireless backbones: measurements from MagNets
— The long-standing vision of ubiquitous Internet access requires high-speed wireless networks that sustain 100 Mbps or more. While existing hardware already supports these speed...
Alessio Botta, Antonio Pescapè, Giorgio Ven...