Sciweavers

280 search results - page 55 / 56
» Bandwidth-sharing in overloaded networks
Sort
View
IMC
2005
ACM
13 years 10 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
DEXA
2004
Springer
98views Database» more  DEXA 2004»
13 years 10 months ago
On Improving the Performance Dependability of Unstructured P2P Systems via Replication
Abstract. The ever-increasing popularity of peer-to-peer (P2P) systems provides a strong motivation for designing a dependable P2P system. Dependability in P2P systems can be viewe...
Anirban Mondal, Yi Lifu, Masaru Kitsuregawa
ICOIN
2001
Springer
13 years 9 months ago
A Proxy Caching Scheme for Continuous Media Streams on the Internet
The Internet has enabled the dissemination and access of vast amounts of information to be easy. But dramatic increases of the number of users of Internet cause server overload, n...
Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, Ki-Dong ...
SIGUCCS
2000
ACM
13 years 9 months ago
Creating a Help Center from Scratch: A Recipe for Success
Creating a university Help Center from scratch can be a challenging yet very rewarding experience for an IT professional. Buying computers, building networks, and installing softw...
Patrick McKoen
AI
2000
Springer
13 years 9 months ago
Keep It Simple: A Case-Base Maintenance Policy Based on Clustering and Information Theory
Abstract. Today’s case based reasoning applications face several challenges. In a typical application, the case bases grow at a very fast rate and their contents become increasin...
Qiang Yang, Jing Wu