Sciweavers

1845 search results - page 245 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
ICDCS
2009
IEEE
15 years 10 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
CSE
2009
IEEE
15 years 8 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
DSN
2008
IEEE
15 years 8 months ago
WS-DREAM: A distributed reliability assessment Mechanism for Web Services
It is critical to guarantee the reliability of serviceoriented applications. This is because they may employ remote Web Services as components, which may easily become unavailable...
Zibin Zheng, Michael R. Lyu
SEMCO
2007
IEEE
15 years 7 months ago
Intelligent Parsing of Scanned Volumes for Web Based Archives
The proliferation of digital libraries and the large amount of existing documents raise important issues in efficient handling of documents. Printed texts in documents need to be...
Xiaonan Lu, James Ze Wang, C. Lee Giles
TELETRAFFIC
2007
Springer
15 years 7 months ago
Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. In a wavelength-routed optical network...
Alicia Nicki Washington, Harry G. Perros