Sciweavers

198 search results - page 39 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
TSP
2010
13 years 28 days ago
ALOHA with collision resolution (ALOHA-CR): theory and software defined radio implementation
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmission occurs in a t...
Xin Liu, John Kountouriotis, Athina P. Petropulu, ...
ICDCS
2008
IEEE
14 years 21 days ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
ATAL
2011
Springer
12 years 6 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...
CCS
2005
ACM
13 years 11 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
NCA
2008
IEEE
14 years 19 days ago
APART: Low Cost Active Replication for Multi-tier Data Acquisition Systems
This paper proposes APART (A Posteriori Active ReplicaTion), a novel active replication protocol specifically tailored for multi-tier data acquisition systems. Unlike existing ac...
Paolo Romano, Diego Rughetti, Francesco Quaglia, B...