In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Abstract. Because middleware abstractions remove the need for lowlevel network programming, modern distributed component systems expose network volatility (i.e., frequent but inter...
Young-Woo Kwon, Eli Tilevich, Taweesup Apiwattanap...
Large-scale distributed systems, e.g., Grid or P2P networks, are targets for large-scale attacks. Unfortunately, few existing systems support propagation of alerts during the atta...
Michael Treaster, William Conner, Indranil Gupta, ...
This paper considers the use of Automatic Request Request (ARQ) schemes in distributed media streaming. We analytically model three different ARQ schemes and derive effective pac...
Tomorrow's multimedia applications will stress all parts of a computer system. To determine the computer resources needed to meet application demands we have developed a new ...