Sciweavers

4037 search results - page 242 / 808
» Routing without ordering
Sort
View
89
Voted
DAGSTUHL
2006
15 years 2 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...
119
Voted
WOA
2003
15 years 2 months ago
Using a Properties Based Naming System in Mobile Agents Environments for Pervasive Computing
— Mobile Agents model is widely accepted as a good solution to simplify the coordination in a complex and distributed environment. Pervasive computing, presents many issues regar...
Fabio Tarantino, Alessio Ravani, Mario Zambrini
91
Voted
ADHOC
2007
91views more  ADHOC 2007»
15 years 26 days ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
JSAC
2006
101views more  JSAC 2006»
15 years 20 days ago
Distributed space-time coding for multihop transmission in power line communication networks
In this paper, we consider transmission in relatively wide-stretched power line communication (PLC) networks, where repeaters are required to bridge the source-to-destination dista...
Lutz H.-J. Lampe, Robert Schober, Simon Yiu
104
Voted
SIMULATION
2002
143views more  SIMULATION 2002»
15 years 11 days ago
GaliLEO: A Simulation Tool for LEO Satellite Constellations
We present GaliLEO, a simulator for the transmission of connection-oriented traffic over a constellation of LEO/MEO (Low / Medium Earth Orbit) satellites. Its scope is limited to ...
Laurent Franck, Francesco Potorti