Sciweavers

636 search results - page 43 / 128
» Computer Networking and Internet Protocols: A Comprehensive ...
Sort
View
NCA
2006
IEEE
15 years 3 months ago
ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation
Large-scale distributed systems, e.g., Grid or P2P networks, are targets for large-scale attacks. Unfortunately, few existing systems support propagation of alerts during the atta...
Michael Treaster, William Conner, Indranil Gupta, ...
ICDCS
2007
IEEE
15 years 4 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...
WWW
2002
ACM
15 years 10 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
GI
2001
Springer
15 years 2 months ago
Access of Mobile IP Users to Firewall Protected VPNs
: The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation b...
Marc Danzeisen, Torsten Braun
IPOM
2009
Springer
15 years 4 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata