Sciweavers

358 search results - page 52 / 72
» Protocols from perceptual observations
Sort
View
POST
2012
162views more  POST 2012»
13 years 5 months ago
Revisiting Botnet Models and Their Implications for Takedown Strategies
Abstract. Several works have utilized network models to study peerto-peer botnets, particularly in evaluating the effectiveness of strategies aimed at taking down a botnet. We obs...
Ting-Fang Yen, Michael K. Reiter
ICRA
2008
IEEE
179views Robotics» more  ICRA 2008»
15 years 4 months ago
Biological stiffness control strategies for the Anatomically Correct Testbed (ACT) hand
— With the goal of developing biologically inspired manipulation strategies for an anthropomorphic hand, we investigated how the human central nervous system utilizes the hands r...
Ravi Balasubramanian, Yoky Matsuoka
IEEEIAS
2008
IEEE
15 years 4 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
AINA
2007
IEEE
15 years 4 months ago
VIP: a Virtual Interface-based aPproach for vertical handover in single-subnet networks
We propose a simple and practical solution, called the Virtual Interface-based aPproach (VIP), for seamless vertical handover in single-subnet networks. VIP combines a virtual int...
Wei-Cheng Xiao, Shih-Hsuan Tang, Cheng-Fu Chou
INFOCOM
1999
IEEE
15 years 2 months ago
Performance Characteristics of Mirror Servers on the Internet
Abstract--As a growing number of web sites introduce mirrors to increase throughput, the challenge for clients becomes determining which mirror will offer the best performance when...
Andy Myers, Peter A. Dinda, Hui Zhang