Sciweavers

17129 search results - page 3175 / 3426
» Applied Computing
Sort
View
ICNS
2008
IEEE
15 years 10 months ago
Towards QoS Improvements of TCP-Based Media Delivery
—The amount of audiovisual data available on the Internet and thus of multimedia communication over today’s networks is increasing at a rapid pace. Despite the availability of ...
Martin Prangl, Ingo Kofler, Hermann Hellwagner
121
Voted
IPPS
2008
IEEE
15 years 10 months ago
Random choices for churn resilient load balancing in peer-to-peer networks
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objecti...
Song Fu, Cheng-Zhong Xu, Haiying Shen
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
NDSS
2008
IEEE
15 years 10 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
NDSS
2008
IEEE
15 years 10 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
« Prev « First page 3175 / 3426 Last » Next »