Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,098,312 papers from all fields of science
Search
Sign In
Create Free Account
Idle scan
The idle scan is a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available. This is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Attack (computing)
Computer security
Encapsulation (networking)
Exploit (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Towards Intelligent LTE Mobility Management through MME Pooling
Emad Aqeeli
,
Abdallah Moubayed
,
A. Shami
Global Communications Conference
2014
Corpus ID: 21405244
Long term evolution (LTE) is a leading mobile technology that provides very high speeds, low latency, and better quality-of…
Expand
2013
2013
Partially Separated Page Tables for Efficient Operating System Assisted Hierarchical Memory Management on Heterogeneous Architectures
Balazs Gerofi
,
Akio Shimada
,
A. Hori
,
Y. Ishikawa
13th IEEE/ACM International Symposium on Cluster…
2013
Corpus ID: 17716639
Heterogeneous architectures, where a multicore processor is accompanied with a large number of simpler, but more power-efficient…
Expand
2010
2010
Spectrum Allocation in Cognitive Radio Networks Using Swarm Intelligence
Beiwei Zhang
,
Kunyuan Hu
,
Yunlong Zhu
Second International Conference on Communication…
2010
Corpus ID: 15954352
“Cognitive radio” is an emerging technique to improve the utilization of radio frequency spectrum in wireless networks. This…
Expand
2009
2009
A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks
S. Shetty
,
Min Song
,
C. Xin
,
E. Park
IEEE INFOCOM
2009
Corpus ID: 36634050
Opportunistic spectrum access presents a new approach to wireless spectrum utilization and management. In this paper, we propose…
Expand
2009
2009
Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID System
Yonghwan Kim
,
Sungsoo Kim
,
S. Lee
,
K. Ahn
International Conference on Advanced Information…
2009
Corpus ID: 17585885
In RFID system, because a collision occurs while a reader attempts to identify multiple tags at the same time, the anti-collision…
Expand
Highly Cited
2006
Highly Cited
2006
Load Balancing in a Cluster Computer
P. Werstein
,
Hailing Situ
,
Zhiyi Huang
International Conference on Parallel and…
2006
Corpus ID: 16349131
This paper proposes a load balancing algorithm for distributed use of a cluster computer. It uses load information including CPU…
Expand
2006
2006
A novel idle mode operation in IEEE 802.11 WLANs: prototype implementation and empirical evaluation
Sunggeun Jin
,
Kwanghun Han
,
Sunghyun Choi
Wireless Mobile Applications and Services on WLAN…
2006
Corpus ID: 53305051
While the IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet…
Expand
2004
2004
Channel adaptive scheduling for cooperative relay networks
Ingmar Hammerstr̈om
,
M. Kuhn
,
A. Wittneben
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 6060178
We consider a wireless network consisting of several active source/destination pairs and several idle nodes. All nodes are…
Expand
2003
2003
Cycle stealing under immediate dispatch task assignment
Mor Harchol-Balter
,
Cuihong Li
,
T. Osogami
,
Alan Scheller-Wolf
,
M. Squillante
ACM Symposium on Parallelism in Algorithms and…
2003
Corpus ID: 436410
We consider the practical problem of task assignment in a server farm, where each arriving job is immediately dispatched to a…
Expand
Highly Cited
1992
Highly Cited
1992
Separable routing: A scheme for state-dependent routing of circuit switched telephone traffic
T. Ott
,
K. Krishnan
Annals of Operations Research
1992
Corpus ID: 21688271
Separable routing is the first of a number of routing schemes for circuit switched telephone traffic invented at Bellcore. These…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE