Sciweavers

1105 search results - page 114 / 221
» Modeling TCP Latency
Sort
View
120
Voted
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
160
Voted
PDP
2006
IEEE
15 years 9 months ago
Video Quality Estimation of DCCP Streaming over Wireless Networks
This paper describes a streaming architecture simulation model above Network Simulator 2 (NS2) which allows to define specific transport properties. Multimedia contents are spec...
Sebastien Linck, Emmanuel Mory, Julien Bourgeois, ...
126
Voted
MSWIM
2006
ACM
15 years 9 months ago
Estimation of perceived quality of service for applications on IPv6 networks
To provide high quality service to future Internet applications, IPv6 performance measurements are needed. However, to the best of our knowledge, IPv6 delay and loss performance e...
Xiaoming Zhou, Henk Uijterwaal, Robert E. Kooij, P...
166
Voted
ACISICIS
2005
IEEE
15 years 9 months ago
Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle Communication
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...
124
Voted
NDSS
2005
IEEE
15 years 9 months ago
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Xiapu Luo, Rocky K. C. Chang