Sciweavers

9588 search results - page 1636 / 1918
» Service Value Networks
Sort
View
ICDCSW
2005
IEEE
15 years 10 months ago
A User-Driven Adaptation Strategy for Mobile Video Streaming Applications
Recent advances in mobile and wireless technologies make possible the bear of new services and the extension of traditional ones in new scenarios. Adaptation strategies play a cru...
Domenico Cotroneo, Generoso Paolillo, C. Pirro, St...
ICRA
2005
IEEE
189views Robotics» more  ICRA 2005»
15 years 10 months ago
Mobile Agent Gain Scheduler Control in Inter-Continental Intelligent Space
- Intelligent Space (iSpace) is a space (room, corridor, or street), which has distributed sensory and mobile agents, that is capable to provide intelligent services. In this paper...
Rangsarit Vanijjirattikhan, Mo-Yuen Chow, Peter Ta...
LCN
2005
IEEE
15 years 10 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
NDSS
2005
IEEE
15 years 10 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
KIVS
2005
Springer
15 years 10 months ago
Exploiting Regular Hot-Spots for Drive-thru Internet
Abstract. IEEE 802.11 WLAN technology has become an inexpensive, yet powerful access technology that is targeted at mobile users that remain within reach of the hot-spot. Such hot-...
Jörg Ott, Dirk Kutscher
« Prev « First page 1636 / 1918 Last » Next »