Sciweavers

849 search results - page 143 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
ACSAC
2001
IEEE
15 years 4 months ago
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server workloads to cause devastation to the service providers. We propose a distribute...
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John ...
INFOCOM
2007
IEEE
15 years 6 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross
101
Voted
MM
2005
ACM
110views Multimedia» more  MM 2005»
15 years 6 months ago
JADE: jabber-based authoring in distributed environments
We present our initial results in developing a framework for collaborative multimedia authoring tools. This research is motivated by the lack of tools that take into account consu...
Andrew Roczniak, Abdulmotaleb El-Saddik
100
Voted
NCA
2003
IEEE
15 years 5 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
136
Voted
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
15 years 4 months ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...