Sciweavers

1462 search results - page 119 / 293
» The Abstract MAC Layer
Sort
View
114
Voted
NAA
2000
Springer
88views Mathematics» more  NAA 2000»
15 years 8 months ago
Schwarz Methods for Convection-Diffusion Problems
Abstract. Various variants of Schwarz methods for a singularly perturbed two dimensional stationary convection-diffusion problem are constructed and analysed. The iteration counts,...
H. MacMullen, Eugene O'Riordan, Grigorii I. Shishk...
ACSAC
1998
IEEE
15 years 9 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
LISA
2007
15 years 7 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
INFOCOM
2005
IEEE
15 years 10 months ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
157
Voted
JUCS
2002
116views more  JUCS 2002»
15 years 4 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...