Sciweavers

1314 search results - page 212 / 263
» New Approaches for Virtual Private Network Design
Sort
View
111
Voted
IFIP
2007
Springer
15 years 8 months ago
Decentralized Supplementary Services for Voice-over-IP Telephony
As current Voice-over-IP (VoIP) systems encourage a direct communication between the callees they are similar in design to peerto-peer (P2P) approaches. Therefore, we introduce a f...
Christoph Spleiß, Gerald Kunzmann
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 6 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
96
Voted
AINA
2010
IEEE
15 years 5 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
MOBISYS
2004
ACM
16 years 1 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
GROUP
2009
ACM
15 years 8 months ago
For a science of group interaction
As a foundation for the design of groupware, we need a new science of group interaction, a systematic description of the processes at the group level of description that may contr...
Gerry Stahl