XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Communication hardware, interfaces and storage

Articles & Features

Spoken dialogue systems

SECTION: Features

Spoken dialogue systems

Wouldn't it be great if we could simply talk to our technical devices instead of relying on cumbersome displays and keyboards to convey what we want?

By Pierre Lison, Raveesh Meena, October 2014

PDF | HTML | In the Digital Library

Tracking how we read

Tracking how we read

Using activity recognition for cognitive tasks can provide new insights about reading and learning habits.

By Kai Kunze, December 2013

PDF | HTML | In the Digital Library

An interview with Mendel Rosenblum

An interview with Mendel Rosenblum

The co-founder of VMware and Associate Professor of Computer Science at Stanford explains how an academic research project evolved into a commercial idea.

By Asaf Cidon, Tomer London, June 2012

PDF | HTML | In the Digital Library

Sustainable sensing for a smarter planet

Sustainable sensing for a smarter planet

At what scale is indoor solar harvesting the better primary power source?

By Prabal Dutta, June 2011

PDF | HTML | In the Digital Library

Let's split!

Let's split!

Going sustainable by dividing personal transportation into two categories.

By Dan Sturges, June 2011

PDF | HTML | In the Digital Library

Clouds at the crossroads

Clouds at the crossroads

Despite its promise, most cloud computing innovations have been almost exclusively driven by a few industry leaders, such as Google, Amazon, Yahoo!, Microsoft, and IBM. The involvement of a wider research community, both in academia and industrial labs, has so far been patchy without a clear agenda. In our opinion, the limited participation stems from the prevalent view that clouds are mostly an engineering and business-oriented phenomenon based on stitching together existing technologies and tools.

By Ymir Vigfusson, Gregory Chockler, March 2010

PDF | HTML | In the Digital Library

Introduction

By Jerry Guo, August 2006

PDF | HTML | In the Digital Library

Comparison of input devices and displays for protein visualization

By Elke Moritz, Thomas Wischgoll, Joerg Meyer, December 2005

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, October 2005

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, August 2005

PDF | HTML | In the Digital Library

Learning from nature

By Anh Nguyen, Tadashi Nakano, Tatsuya Suda, August 2005

PDF | HTML | In the Digital Library

A distributed security scheme for ad hoc networks

In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.

By Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal, Ajith Abraham, September 2004

PDF | HTML | In the Digital Library

Zero configuration networking

By David Stirling, Firas Al-Ali, June 2003

PDF | HTML | In the Digital Library

Networking: introduction

By Mark Allman, September 1995

PDF | HTML | In the Digital Library

The Fox Project

By Jeremy Buhler, September 1995

PDF | HTML | In the Digital Library