Sciweavers

9588 search results - page 1776 / 1918
» Service Value Networks
Sort
View
VTC
2007
IEEE
117views Communications» more  VTC 2007»
15 years 4 months ago
On the Coexistence of Overlapping BSSs in WLANs
— In this paper, we investigate the issue of 20/40 MHz coexistence in next generation wireless local area networks (WLAN). To that end, we present simulation results of overlappi...
Ariton E. Xhafa, Anuj Batra, Artur Zaks
WETICE
2007
IEEE
15 years 4 months ago
A Dominating Set Based Peer-to-Peer Protocol for Real-Time Multi-source Collaboration
Designing a collaborative architecture for real-time applications is an intricate challenge that usually involves dealing with the real-time constraints, resource limitations and ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi, Abdulmo...
CCS
2007
ACM
15 years 4 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
EUROGP
2007
Springer
102views Optimization» more  EUROGP 2007»
15 years 4 months ago
Real-Time, Non-intrusive Evaluation of VoIP
Abstract. Speech quality, as perceived by the users of Voice over Internet Protocol (VoIP) telephony, is critically important to the uptake of this service. VoIP quality can be deg...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 4 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
« Prev « First page 1776 / 1918 Last » Next »