Sciweavers

981 search results - page 181 / 197
» Semantics-aware trace analysis
Sort
View
95
Voted
AINA
2008
IEEE
15 years 6 months ago
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) have specific constraints and stringent requirements in contrast to traditional wired and wireless computer networks. Among these specific requireme...
Khurram Shahzad, Arshad Ali, N. D. Gohar
106
Voted
GLOBECOM
2008
IEEE
15 years 6 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
ICDCS
2008
IEEE
15 years 6 months ago
Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation
Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely-coupled distributed systems. Besides inter-node heter...
Michael Cardosa, Abhishek Chandra
INFOCOM
2008
IEEE
15 years 6 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
IPPS
2008
IEEE
15 years 6 months ago
On the need for query-centric unstructured peer-to-peer overlays
—Hybrid P2P systems rely on the assumption that sufficient objects exist nearby in order to make the unstructured search component efficient. This availability depends on the o...
William Acosta, Surendar Chandra