Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
Multipurpose Internet Mail Extensions (MIME) provide a simple way to describe the type of data sent and its use. Email and the web use MIME extensively to carry different files. Th...
Lloyd Wood, Peter Holliday, Daniel Floreani, Ioann...
—Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability pr...
We investigate a problem of maintaining a target population of mobile agents in a distributed system. The purpose of the agents is to perform certain activities, so the goal is to...
Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz ...