Sciweavers

2047 search results - page 218 / 410
» Pervasive Computing on Active Networks
Sort
View
CONEXT
2008
ACM
15 years 6 months ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer
PERCOM
2006
ACM
15 years 4 months ago
Dynamic Discovery and Monitoring in Migratory Interactive Services
Migratory interactive services play an important role in supporting mobile users because they allow them to continue their activities across interaction with different devices. Wh...
Renata Bandelloni, Fabio Paternò, Zigor Sal...
NDSS
1998
IEEE
15 years 9 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
IWCMC
2006
ACM
15 years 10 months ago
Multi-hop CDMA cellular networks with power control
The concept of multi-hop CDMA cellular networks has been around for sometime now. It is a widely accepted assumption that using multi-hopping in cellular networks will increase th...
Ayman Radwan, Hossam S. Hassanein
NSDI
2008
15 years 7 months ago
Reducing Network Energy Consumption via Sleeping and Rate-Adaptation
We present the design and evaluation of two forms of power management schemes that reduce the energy consumption of networks. The first is based on putting network components to s...
Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone...