Sciweavers

1718 search results - page 99 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
ICMCS
2006
IEEE
106views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Constructing Robust and Resilient Framework for Cooperative Video Streaming
Peer-to-peer based streaming has been a promising solution for large-scale video broadcasting over the Internet. In a peer-to-peer video streaming framework, peers cooperate with ...
Shi Lu, Michael R. Lyu
IJDE
2002
145views more  IJDE 2002»
14 years 9 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
AICT
2006
IEEE
108views Communications» more  AICT 2006»
15 years 3 months ago
Enhancing IEEE 802.11e standard in congested environments
IEEE 802.11e is a wireless local area networking standard introducing quality of service. It defines new MAC protocols, mainly HCF and EDCF. EDCF is a contentionbased channel acce...
Mounir Frikha, Fatma Ben Said, Lilia Maalej, Faiza...
ICNS
2006
IEEE
15 years 3 months ago
Service Level Agreement Management with Adaptive Coordination
Service Level Agreement Management in the telecommunications domain consists of a set of mechanisms for provisioning and monitoring services according to requirements given by eit...
Dominic A. P. Greenwood, Giosuè Vitaglione,...
IDEAL
2004
Springer
15 years 3 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...