International Conference on Computer Network and Mobile Computing最新文献

筛选
英文 中文
APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents 基于多智能体的面向内部的入侵检测系统
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_128
D. Pi, Qiang Wang, Weiqi Li, J. Lv
{"title":"APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents","authors":"D. Pi, Qiang Wang, Weiqi Li, J. Lv","doi":"10.1007/11534310_128","DOIUrl":"https://doi.org/10.1007/11534310_128","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage Algorithm and Protocol in Heterogeneous Sensor Networks 异构传感器网络中的覆盖算法与协议
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_8
Lu Su, Qing Yang, Quanlong Li, Xiaofei Xu
{"title":"Coverage Algorithm and Protocol in Heterogeneous Sensor Networks","authors":"Lu Su, Qing Yang, Quanlong Li, Xiaofei Xu","doi":"10.1007/11534310_8","DOIUrl":"https://doi.org/10.1007/11534310_8","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123922105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Provable Security of ID-Based Proxy Signature Schemes 基于身份的代理签名方案的可证明安全性
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_134
Chunxiang Gu, Yuefei Zhu
{"title":"Provable Security of ID-Based Proxy Signature Schemes","authors":"Chunxiang Gu, Yuefei Zhu","doi":"10.1007/11534310_134","DOIUrl":"https://doi.org/10.1007/11534310_134","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks 停止异常与加权窒息拯救行为良好的TCP会话从鼩DDoS攻击
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_46
Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, K. Hwang
{"title":"HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks","authors":"Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, K. Hwang","doi":"10.1007/11534310_46","DOIUrl":"https://doi.org/10.1007/11534310_46","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128717686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition 用于自动Web服务组合的Web服务对等发现服务
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_55
Jian-Qiang Hu, Changguo Guo, Huaimin Wang, Peng Zou
{"title":"Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition","authors":"Jian-Qiang Hu, Changguo Guo, Huaimin Wang, Peng Zou","doi":"10.1007/11534310_55","DOIUrl":"https://doi.org/10.1007/11534310_55","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput 实现100%吞吐量的虚拟输出队列交换机的公平平滑调度
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_44
Min Song, S. Shetty, Wu Li
{"title":"Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput","authors":"Min Song, S. Shetty, Wu Li","doi":"10.1007/11534310_44","DOIUrl":"https://doi.org/10.1007/11534310_44","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CORBA-Based Dynamic Reconfigurable Middleware 基于corba的动态可重构中间件
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_126
Wanjun Huang, Xiaohua Fan, C. Meinel
{"title":"A CORBA-Based Dynamic Reconfigurable Middleware","authors":"Wanjun Huang, Xiaohua Fan, C. Meinel","doi":"10.1007/11534310_126","DOIUrl":"https://doi.org/10.1007/11534310_126","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols 一类公平交换协议中的RSA扩展模攻击及其解决方案
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_114
Ping Li, Lalin Jiang, Jiaying Wu, Jing Zhang
{"title":"RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols","authors":"Ping Li, Lalin Jiang, Jiaying Wu, Jing Zhang","doi":"10.1007/11534310_114","DOIUrl":"https://doi.org/10.1007/11534310_114","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Designing Adaptive AQM Schemes 自适应AQM方案的设计框架
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_83
Wen-hua Dou, Ming Liu, He-ying Zhang, Yan-xing Zheng
{"title":"A Framework for Designing Adaptive AQM Schemes","authors":"Wen-hua Dou, Ming Liu, He-ying Zhang, Yan-xing Zheng","doi":"10.1007/11534310_83","DOIUrl":"https://doi.org/10.1007/11534310_83","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114356197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model 无线Ad Hoc网络中路由发现的性能分析:一个统一模型
International Conference on Computer Network and Mobile Computing Pub Date : 2005-08-02 DOI: 10.1007/11534310_35
Xian Liu, Y. Chan
{"title":"Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model","authors":"Xian Liu, Y. Chan","doi":"10.1007/11534310_35","DOIUrl":"https://doi.org/10.1007/11534310_35","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121937281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信