Sciweavers

161 search results - page 32 / 33
» Mixing It Up
Sort
View
82
Voted
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 10 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
110
Voted
JPDC
2006
253views more  JPDC 2006»
14 years 10 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
96
Voted
TPDS
2008
196views more  TPDS 2008»
14 years 10 months ago
End-to-End Energy Management in Networked Real-Time Embedded Systems
Recent technological advances have opened up a wide range of distributed real-time applications involving battery-driven embedded devices with local processing and wireless communi...
G. Sudha Anil Kumar, Govindarasu Manimaran, Zhengd...
75
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks
—Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via processing and mixing of data packets at intermedi...
Tae-Suk Kim, Serdar Vural, Ioannis Broustis, Dimit...
84
Voted
IMC
2010
ACM
14 years 8 months ago
On the characteristics and reasons of long-lived internet flows
Prior studies of Internet traffic have considered traffic at different resolutions and time scales: packets and flows for hours or days, aggregate packet statistics for days or we...
Lin Quan, John Heidemann