Sciweavers

1281 search results - page 114 / 257
» Providing Consistent Service Levels in IP Networks
Sort
View
NDSS
2003
IEEE
15 years 9 months ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
ICPADS
2005
IEEE
15 years 10 months ago
Game Theory As A Tool To Strategize As Well As Predict Nodes Behavior In Peer-to-Peer Networks
In this paper we use game theory to study nodes’ behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to inc...
Rohit Gupta, Arun K. Somani
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 11 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...
CCS
2008
ACM
15 years 6 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
GRID
2005
Springer
15 years 10 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...