Sciweavers

12301 search results - page 2033 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
114
Voted
NDSS
2006
IEEE
15 years 11 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
137
Voted
MINENET
2006
ACM
15 years 11 months ago
Mining web logs to debug distant connectivity problems
Content providers base their business on their ability to receive and answer requests from clients distributed across the Internet. Since disruptions in the flow of these request...
Emre Kiciman, David A. Maltz, Moisés Goldsz...
CLUSTER
2005
IEEE
15 years 10 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny
153
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming
The widespread popularity of roaming wireless devices with limited and heterogeneous capabilities is enabling new challenging deployment scenarios for multimedia streaming in wire...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
ACMACE
2005
ACM
15 years 10 months ago
Rendezvous: supporting real-time collaborative mobile gaming in high latency environments
Despite the ever increasing popularity of handheld, networked gaming consoles, fully interactive real-time, multiplayer games designed for these platforms have yet to become a rea...
Angie Chandler, Joe Finney
« Prev « First page 2033 / 2461 Last » Next »