Sciweavers

529 search results - page 26 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
98
Voted
CCS
2007
ACM
15 years 7 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
JNW
2008
126views more  JNW 2008»
15 years 1 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
SC
1992
ACM
15 years 5 months ago
Willow: A Scalable Shared Memory Multiprocessor
We are currently developing Willow, a shared-memory multiprocessor whose design provides system capacity and performance capable of supporting over a thousand commercial microproc...
John K. Bennett, Sandhya Dwarkadas, Jay A. Greenwo...
ICIP
1999
IEEE
16 years 3 months ago
An End-To-End Architecture for Mpeg-4 Video Streaming over the Internet
It is a challenging problem to design an e cient MPEG-4 video delivery system that can maximize the perceptual quality while achieving high resource utilization. This paper addres...
Yiwei Thomas Hou, Dapeng Wu, Wenwu Zhu, Hung-Ju Le...
116
Voted
ICNP
2009
IEEE
15 years 8 months ago
Declarative Policy-based Adaptive MANET Routing
—This paper presents the design and implementation of declarative policy-based adaptive MANET routing protocols. Our work builds upon declarative networking, a recent innovation ...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...