Sciweavers

847 search results - page 143 / 170
» Monitoring the connectivity of a grid
Sort
View
IMC
2003
ACM
15 years 7 months ago
On the number of distributed measurement points for network tomography
Internet topology information is only made available in aggregate form by standard routing protocols. Connectivity information and latency characteristicsmust therefore be inferre...
Joseph Douglas Horton, Alejandro López-Orti...
90
Voted
SACMAT
2003
ACM
15 years 7 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
ICRA
2002
IEEE
116views Robotics» more  ICRA 2002»
15 years 6 months ago
Staying Alive: A Docking Station for Autonomous Robot Recharging
—Autonomous mobile robots are constrained in their long-term functionality due to a limited on-board power supply. Typically, rechargeable batteries are utilized that may only pr...
Milo C. Silverman, Dan Nies, Boyoon Jung, Gaurav S...
INFOCOM
2002
IEEE
15 years 6 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ITCC
2002
IEEE
15 years 6 months ago
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes
Audio watermarking has become an important technology for recording and advertisement industry. Today’s embedding and detection strategies often rely on digital or at least high...
Martin Steinebach, Andreas Lang, Jana Dittmann, Ch...