Sciweavers

1447 search results - page 148 / 290
» Simulating Internet Worms
Sort
View
CCR
2004
90views more  CCR 2004»
15 years 1 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
110
Voted
ICIP
2002
IEEE
16 years 3 months ago
Robust and efficient scalable video coding with leaky prediction
This paper presents a robust scalable video coding scheme with leaky prediction, suitable for time-varying error-prone channels, such as the Internet or wireless channels. The pro...
Sangeun Han, Bernd Girod
85
Voted
ESORICS
2009
Springer
16 years 2 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
95
Voted
PERCOM
2005
ACM
16 years 1 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
MOBIHOC
2004
ACM
16 years 1 months ago
Locating cache proxies in manets
Caching Internet based services is a potentially important application for MANETs, as it can improve mobile users' perceived quality of service, reduce their energy consumpti...
Roy Friedman, Maria Gradinariu, Gwendal Simon