– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
New demands brought by the continuing growth of the Internet will be met in part by more effective and comprehensive use of caching. This paper proposes to exploit client browser ...
Online training and support objects can be difficult and timeconsuming to create. Written words are often ignored by users who want someone to show them a procedure. Viewlets are ...
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis...
Fred Kuhns, John D. DeHart, Anshul Kantawala, Ralp...
Abstract. In this paper we introduce SYGo, an innovative hide-andseek game which is part of the AMOGA research project of the University of Bonn in cooperation with and funded by D...