Sciweavers

1447 search results - page 144 / 290
» Simulating Internet Worms
Sort
View
WWW
2010
ACM
15 years 2 months ago
QuickSuggest: character prediction on web appliances
As traditional media and information devices integrate with the web, they must suddenly support a vastly larger database of relevant items. Many devices use remote controls with o...
Ullas Gargi, Rich Gossweiler
113
Voted
COMCOM
2008
138views more  COMCOM 2008»
15 years 2 months ago
MRP: Wireless mesh networks routing protocol
Wireless Mesh Networks (WMNs) are one of the few commonly implemented types of mobile ad-hoc networks (MANETs); several companies offer WMNs for broadband Internet access and for ...
Jangeun Jun, Mihail L. Sichitiu
COMCOM
2007
99views more  COMCOM 2007»
15 years 1 months ago
Topology-aware overlay path probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2 ), which is prohibitive in large-scale...
Chiping Tang, Philip K. McKinley
122
Voted
JNCA
2007
75views more  JNCA 2007»
15 years 1 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
83
Voted
URBAN
2008
90views more  URBAN 2008»
15 years 1 months ago
The use of Web 2.0 concepts to support deliberation in spatial decision-making
Technologies associated with the second-generation of the World-Wide Web enable virtually anyone to share their data, documents, observations, and opinions on the Internet. In les...
Claus Rinner, Carsten Keßler, Stephen Andrul...