Sciweavers

9588 search results - page 1650 / 1918
» Service Value Networks
Sort
View
ACSW
2006
15 years 5 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan
CIIT
2004
268views Communications» more  CIIT 2004»
15 years 5 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
CNIS
2006
15 years 5 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
CSREAPSC
2006
15 years 5 months ago
The Anatomy of a Universal Domotics Integrator for Globally Interconnected Devices
Home Automation Technologies make possible the deployment of home monitoring and control applications. These technologies rely on different networking technologies. Some of them ar...
Driart Elshani, Pascal Francq
CSREAPSC
2006
15 years 5 months ago
A Context-aware Handoff Management for Seamless Connectivity in Ubiquitous Computing Environment
- Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity is not considered properly. To provide seamless connectivity, this pap...
Tae-Hoon Kang, Chung-Pyo Hong, Yong-Seok Kim, Shin...
« Prev « First page 1650 / 1918 Last » Next »