Skip to main content
In the IEEE 802.11 Power Save Mode (PSM) specified for Independent Basic Service Set (IBSS), time is divided into beacon intervals. At the beginning of each beacon interval, each station in the power save mode periodically wakes up for a... more
    • by 
Self calibration based blind attacks are quite accurate to detect JPEG domain steganography. Efficient prediction of cover image statistics from its stego version is an important requirement in calibration based attacks. Domain separation... more
    • by 
    • Steganography
    • by 
    •   14  
      Information SystemsComputer ScienceData AnalysisConfiguration Management
    • by 
    •   32  
      Computer ScienceDistributed ComputingMobile Ad Hoc NetworksPerformance
Ad hoc networks, which have seen drastic increase in their usage scenarios and convergence of different applications' traffic lately, are getting ready to support QoS and secure traffic. Existing protocols for ad hoc networks provide... more
    • by 
    •   10  
      Routing protocolsRouting Mobile Ad-hoc NetworkAd Hoc NetworksQuality of Service
A cluster-based route discovery and dynamic route management protocol for ad hoc networks with inaccurate information for given QoS (Quality of Service) requirements has been proposed and compared with existing routing protocols. The... more
    • by 
    •   13  
      Distributed AlgorithmsRouting protocolsAdaptive SystemsAd Hoc Networks
    • by 
    •   5  
      Distributed Denial of Service AttackInternet Service ProviderIp TracebackPacket filtering
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. Recent comparative studies between Ad hoc on demand routing protocols like Ad... more
    • by 
    •   8  
      Comparative StudyMobile Ad Hoc NetworkPhysical LayerAd hoc network
Clustering in ad hoc networks provides significant support for implementation of QoS and security, by overcoming inherent network deficiencies (like lack of infrastructure etc.). In a clustered network architecture, the ad hoc network is... more
    • by 
    •   7  
      Routing algorithmNetwork FormationQuality of ServiceHPC
In the Internet, with many competing networks each trying to optimise its own bandwidth, a stub network has limited knowledge about user demands, available network resources and routing policies of other networks. This uncertainty makes... more
    • by 
    •   4  
      Resource AllocationData CollectionLoad BalanceInternet
A model for storage and retrieval of relevant documents during a document production workflow in an ofJice is presented. The objective of the workflow is to review a document by multiple reviewers, where each reviewer contributes her own... more
    • by 
    •   11  
      FinanceComputer ScienceProductionNavigation
In order to bridge the speed disparity at the LAN-WAN interface, enterprises install a number of policy-based devices to enforce administrative policies over the WAN access. The conventional techniques of bandwidth management concentrate... more
    • by 
    •   5  
      Local Area NetworksBandwidth AllocationBandwidth managementLoad Balance
    • by 
Identifying the sources of a Distributed Denial-of-Service (DDoS) attack is among the hardest problems in the Internet security area. Use of reflectors in a DDoS attack makes the problem particularly difficult as the actual sources of... more
    • by 
    •   2  
      Internet SecurityDDOS Attack
A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the process of data recovery. With the present day demand for... more
    • by 
    •   5  
      File SystemsReading and writingConsistencyData Integrity
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are becoming increasingly sophisticated with few practical solutions available. In this paper we consider the issue of filtering reflector based DoS attacks and of... more
    • by 
    •   6  
      DoS AttackDistributed Denial of Service AttackComputer Network SecurityDenial of Service
A number of multi-version file systems have been proposed and implemented in recent years. Besides presenting an option for the user to recover from mistakes, versioning is also useful for crash recovery. This paper presents a... more
    • by 
    •   3  
      File SystemDocument ManagementUniversity of Southern California
Load balancing traffic of a multihomed stub network among its various egress links can significantly improve performance by allowing the network to route its traffic around congested paths. In, several centralized route control schemes to... more
    • by 
    •   4  
      Load BalanceRound Trip TimeInternetDistributed Algorithm
Devices which have limited computing resources but are capable of networking have become increasingly important constituents of distributed environments. In order to maximize the advantages of their networking capability, it is important... more
    • by 
    • Distributed Environment
Bursty, high-bandwidth, real-time and mission-critical applications are driving the need for better differentiation of service in the campus network beyond that provided by traditional best-effort services. The ability to provide these... more
    • by 
    •   3  
      Performance ImprovementDesign and ImplementationManagement Tool