Sciweavers

34181 search results - page 6440 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
AINA
2006
IEEE
15 years 9 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
BROADNETS
2004
IEEE
15 years 9 months ago
Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks
This paper presents the detailed design and performance analysis of MACA-P, a RTS/CTS based MAC protocol, that enables simultaneous transmissions in wireless mesh networks. The IE...
Arup Acharya, Archan Misra, Sorav Bansal
APN
2006
Springer
15 years 9 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...
APNOMS
2006
Springer
15 years 9 months ago
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework i...
Dong-Hui Kim, Jae-Oh Lee
APNOMS
2006
Springer
15 years 9 months ago
A Novel Rekey Management Scheme in Digital Broadcasting Network
Conditional Access System (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil...
Han-Seung Koo, Il-Kyoo Lee, Jae-Myung Kim, Sung-Wo...
« Prev « First page 6440 / 6837 Last » Next »