Sciweavers

124 search results - page 24 / 25
» SEDA: An Architecture for Well-Conditioned, Scalable Interne...
Sort
View
JNW
2006
142views more  JNW 2006»
13 years 6 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
PE
2008
Springer
173views Optimization» more  PE 2008»
13 years 6 months ago
Improving fairness in a WRED-based DiffServ network: A fluid-flow approach
The DiffServ architecture has been proposed as a scalable approach for upgrading the Internet, adding service differentiation functionalities. However, several aspects of this arc...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...
CCR
2004
95views more  CCR 2004»
13 years 6 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
CASES
2006
ACM
13 years 10 months ago
High-performance packet classification algorithm for many-core and multithreaded network processor
Packet classification is crucial for the Internet to provide more value-added services and guaranteed quality of service. Besides hardware-based solutions, many software-based cla...
Duo Liu, Bei Hua, Xianghui Hu, Xinan Tang
HPDC
2010
IEEE
13 years 7 months ago
BTWorld: towards observing the global BitTorrent file-sharing network
Today, the BitTorrent Peer-to-Peer file-sharing network is one of the largest Internet applications--it generates massive traffic volumes, it is deployed in thousands of independe...
Maciej Wojciechowski, Mihai Capotâ, Johan A....