Sciweavers

1314 search results - page 193 / 263
» New Approaches for Virtual Private Network Design
Sort
View
CN
2007
137views more  CN 2007»
15 years 1 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
WOA
2003
15 years 3 months ago
Filling the Gap Between Users and Objects: a Multichannel Interactive Environment
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...
CN
2002
112views more  CN 2002»
15 years 1 months ago
Performance evaluation of a queue fed by a Poisson Pareto burst process
This paper provides means for performance evaluation of a queue with Poisson Pareto Burst Process (PPBP) input. Because of the long range dependent nature of the PPBP, straightfor...
Ron Addie, Timothy D. Neame, Moshe Zukerman
MOBIHOC
2008
ACM
16 years 1 months ago
Energy efficient multi-path communication for time-critical applications in underwater sensor networks
Due to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for time-critical applications in an energy-ef...
Zhong Zhou, Jun-Hong Cui
ICIP
2005
IEEE
15 years 7 months ago
Adaptive transcoding proxy architecture for video streaming in mobile networks
Wireless video streaming is an area of extensive research due to the error-prone nature of the radio channel with variations in throughput and delay. In mobile networks, handovers...
Matthias Dick, Jens Brandt, Verena Kahmann, Lars C...