Sciweavers

8540 search results - page 228 / 1708
» The Dynamic Servers Problem
Sort
View
124
Voted
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 9 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
135
Voted
SSD
2007
Springer
176views Database» more  SSD 2007»
15 years 9 months ago
Distributed, Concurrent Range Monitoring of Spatial-Network Constrained Mobile Objects
The ability to continuously monitor the positions of mobile objects is important in many applications. While most past work has been set in Euclidean spaces, the mobile objects rel...
Hua Lu, Zhiyong Huang, Christian S. Jensen, Linhao...
104
Voted
WDAG
2007
Springer
102views Algorithms» more  WDAG 2007»
15 years 9 months ago
A Denial-of-Service Resistant DHT
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely...
Baruch Awerbuch, Christian Scheideler
LCN
2005
IEEE
15 years 9 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
94
Voted
EUROPKI
2004
Springer
15 years 8 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith