Sciweavers

2259 search results - page 438 / 452
» internet 2007
Sort
View
SMC
2007
IEEE
224views Control Systems» more  SMC 2007»
15 years 3 months ago
Complex networks as control paradigm for complex systems
—Rooted in a deep understanding of their major properties, a control paradigm for complex systems is proposed based on latest advances in modeling the dynamics of complex network...
Stefan Grobbelaar, Mihaela Ulieru
SRDS
2007
IEEE
15 years 3 months ago
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
Code injection attacks are a top threat to today’s Internet. With zero-day attacks on the rise, randomization techniques have been introduced to diversify software and operation...
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wa...
GLOBECOM
2007
IEEE
15 years 3 months ago
Path Diversity in Packet Switched Networks: Performance Analysis and Rate Allocation
—Path diversity works by setting up multiple parallel connections between the end points using the topological path redundancy of the network. In this paper, Forward Error Correc...
Shervan Fashandi, Shahab Oveis Gharan, Amir K. Kha...
MUE
2007
IEEE
102views Multimedia» more  MUE 2007»
15 years 3 months ago
Ubiquitous Multimedia Information Delivering Service for Smart Home
In ubiquitous computing environments like smart home, residents can conveniently enjoy various home entertainments, such as watching TV, listening music, etc, through invisible an...
Jenq-Muh Hsu, Wei-Juing Wu, I-Ray Chang
CCS
2007
ACM
15 years 3 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...