Sciweavers

621 search results - page 91 / 125
» Security of Internet Location Management
Sort
View
QOFIS
2000
Springer
15 years 5 months ago
On ACK Filtering on a Slow Reverse Channel
ACK filtering has been proposed as a technique to alleviate the congestion at the input of a slow channel located on the reverse path of a TCP connection. Old ACKs waiting at the ...
Chadi Barakat, Eitan Altman
USENIX
1994
15 years 3 months ago
Experiences with a Survey Tool for Discovering Network Time Protocol Servers
The Network Time Protocol (NTP) is widely used to synchronize computer clocks throughout the Internet. Existing NTP clients and servers form a very large distributed system, and y...
James D. Guyton, Michael F. Schwartz
WAIM
2010
Springer
15 years 9 days ago
Enriching the Contents of Enterprises' Wiki Systems with Web Information
Abstract. Wikis are currently used in providing knowledge management systems for individual enterprises. The initial explanations of word entries (entities) in such a system can be...
Li Zhao, Yexin Wang, Congrui Huang, Yan Zhang
IMC
2009
ACM
15 years 8 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
APWEB
2008
Springer
15 years 3 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang