Sciweavers

2442 search results - page 338 / 489
» Secure Service Orchestration
Sort
View
CIIT
2004
131views Communications» more  CIIT 2004»
14 years 11 months ago
Effectiveness of rate-limiting in mitigating flooding DOS attacks
This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to di...
Jarmo Mölsä
IJWMC
2007
103views more  IJWMC 2007»
14 years 10 months ago
Interworking of 3G cellular networks and wireless LANs
: The Third Generation (3G) cellular networks provide ubiquitous connectivity but low data rates, whereas Wireless Local Area Networks (WLANs) can offer much higher data rates but ...
Wei Song, Weihua Zhuang, Aladdin Saleh
JWSR
2007
129views more  JWSR 2007»
14 years 10 months ago
Extensible Architecture for High-Performance, Scalable, Reliable Publish-Subscribe Eventing and Notification
Existing Web service notification and eventing standards are useful in many applications, but they have serious limitations that make them ill-suited for large-scale deployments, ...
Krzysztof Ostrowski, Ken Birman, Danny Dolev
BEHAVIOURIT
2004
122views more  BEHAVIOURIT 2004»
14 years 10 months ago
Adopters and non-adopters of internet stock trading in Singapore
This study examines the attitudes of adopters and non-adopters toward Internet stock trading in Singapore. Data were collected using a web-based questionnaire survey. Usable respon...
Thompson S. H. Teo, Margaret Tan, Suat Nee Peck
ICUMT
2009
14 years 7 months ago
Visualizations of human activities in sensor-enabled ubiquitous environments
Abstract--Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level con...
Brian J. d'Auriol, Le Xuan Hung, Sungyoung Lee, Yo...