Sciweavers

529 search results - page 56 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
WWW
2004
ACM
16 years 2 months ago
The interoperability of learning object repositories and services: standards, implementations and lessons learned
Interoperability is one of the main issues in creating a networked system of repositories. The eduSource project in its holistic approach to building a network of learning object ...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 6 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
128
Voted
DAC
1999
ACM
15 years 6 months ago
Panel: What is the Proper System on Chip Design Methodology
ion model or flexible PCB solutions cannot offer a valid solution for the next millinium SoCs . James G. Dougherty, Integrated Systems Silicon LTD, Belfast, Northern Ireland ISS an...
Richard Goering, Pierre Bricaud, James G. Doughert...
CONCURRENCY
2007
101views more  CONCURRENCY 2007»
15 years 1 months ago
OpenUH: an optimizing, portable OpenMP compiler
OpenMP has gained wide popularity as an API for parallel programming on shared memory and distributed shared memory platforms. Despite its broad availability, there remains a need ...
Chunhua Liao, Oscar Hernandez, Barbara M. Chapman,...
111
Voted
WS
2003
ACM
15 years 7 months ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...