Sciweavers

3039 search results - page 493 / 608
» A Network Positioning System for the Internet
Sort
View
WWW
2003
ACM
15 years 10 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 3 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
IMC
2006
ACM
15 years 4 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
STOC
2003
ACM
99views Algorithms» more  STOC 2003»
15 years 10 months ago
On the fractal behavior of TCP
We propose a natural, mathematically tractable model of TCP which captures both its additive-increase, multiplicative-decrease behavior and its feedback mechanism. Neither a fluid...
Anna C. Gilbert, Howard J. Karloff
PADS
2009
ACM
15 years 4 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu