Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Lothar Braun"'
Publikováno v:
Computer Communications. 74:63-76
Wireless sensor networks (WSNs) as a central part of cyber-physical systems are gaining commercial momentum in many areas, including building monitoring and intelligent home automation. Users wish to successively deploy hardware from different vendor
Publikováno v:
Computing. 96:15-26
New web technologies led to the development of browser applications for data analysis. Modern browser engines allow for building interactive real-time visualization applications that enable efficient ways to understand complex data. We present Flow-I
Publikováno v:
Traffic Monitoring and Analysis ISBN: 9783319171715
TMA
Lecture Notes in Computer Science
7th Workshop on Traffic Monitoring and Analysis (TMA)
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
TMA
Lecture Notes in Computer Science
7th Workshop on Traffic Monitoring and Analysis (TMA)
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
Part 5: New Protocols; International audience; For many years Distributed Denial-of-Service attacks have been known to be a threat to Internet services. Recently a configuration flaw in NTP daemons led to attacks with traffic rates of several hundred
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::09bb058ca4c841e191a84b7e64b748fb
https://doi.org/10.1007/978-3-319-17172-2_14
https://doi.org/10.1007/978-3-319-17172-2_14
Publikováno v:
Journal of the Chemical Society, Dalton Transactions. :3133-3136
Tris(pyrazolyl)borate ligands were synthesized by a new route from MeBBr2 and pyrazole derivatives under very mild conditions at room temperature to give TlL complexes. For L = [MeB(3,5-Me2pz)3]– a bridging co-ordination of the ligand is found, int
Publikováno v:
Telecommunication Systems.
Medium Access Control (MAC) protocols for Wireless Sensor Networks (WSN) are usually designed as random access protocols that apply different kinds of backoff strategies since Time Division Multiple Access (TDMA) based protocols with admission contro
Publikováno v:
WOWMOM
The performance of a mesh network is mainly affected by the utilized routing protocol and its capability to detect topology changes and to select stable and reliable routes. In real-world scenarios, a high fraction of links have asymmetric characteri
Autor:
Lothar Braun, Alexander Klein
Publikováno v:
2012 Wireless Advanced (WiAd).
The majority of Medium Access Control (MAC) protocols that are designed for Wireless Sensor Networks (WSN) solely rely on the carrier-sense capabilities of the transceiver. Typical low-power transceivers require a large amount of time to detect a bus
Publikováno v:
NOMS
Recent studies observed video download platforms which contribute a large share to the overall traffic mix in today's operator networks. Traffic related to video downloads has reached a level where operators, network equipment vendors, and standardiz
Publikováno v:
Internet Measurement Conference
The SSL and TLS infrastructure used in important protocols like HTTPs and IMAPs is built on an X.509 public-key infrastructure (PKI). X.509 certificates are thus used to authenticate services like online banking, shopping, e-mail, etc. However, it al