Sciweavers

948 search results - page 175 / 190
» Making a Game of Network Security
Sort
View
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
15 years 4 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin
ICPP
2007
IEEE
15 years 4 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
LCN
2006
IEEE
15 years 3 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 3 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 3 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi