Sciweavers

9095 search results - page 1624 / 1819
» Service RT Systems
Sort
View
122
Voted
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 11 months ago
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures
Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Guido Schryen
ICDCS
2006
IEEE
15 years 11 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
ICMCS
2006
IEEE
162views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Video Transport Over Multi Hop Directional Wireless Networks
Exploiting directional antenna technology in wireless networks has become an attractive option because of the potential capacity increase through spatial reuse. Such development a...
Hong Man, Yang Li, Xinhua Zhuang
INFOCOM
2006
IEEE
15 years 11 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
INFOCOM
2006
IEEE
15 years 11 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
« Prev « First page 1624 / 1819 Last » Next »