Sciweavers

680 search results - page 99 / 136
» Locating Hidden Servers
Sort
View
LCN
2007
IEEE
15 years 4 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
ICSOC
2007
Springer
15 years 3 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
SEMWEB
2007
Springer
15 years 3 months ago
WWWatch: Watching the World in Different Views with Semantic Web
This paper develops a Semantic Web application, namely WorldWideWatch or WWWatch, in short. By employment of Semantic Web technologies, WWWatch analyses and visualizes social netwo...
Ekgarach Sumsiripong, Krissada Maleewong, Rachanee...
SSD
2007
Springer
189views Database» more  SSD 2007»
15 years 3 months ago
Collaborative Spatial Data Sharing Among Mobile Lightweight Devices
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
CCECE
2006
IEEE
15 years 3 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...