Sciweavers

4288 search results - page 788 / 858
» Domesticating Computers and the Internet
Sort
View
VIZSEC
2005
Springer
15 years 5 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
IMC
2004
ACM
15 years 5 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
IMC
2004
ACM
15 years 5 months ago
On the responsiveness of DNS-based network control
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balacha...
MM
2004
ACM
136views Multimedia» more  MM 2004»
15 years 5 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
SPAA
2004
ACM
15 years 5 months ago
On achieving optimized capacity utilization in application overlay networks with multiple competing sessions
In this paper, we examine the problem of large-volume data dissemination via overlay networks. A natural way to maximize the throughput of an overlay multicast session is to split...
Yi Cui, Baochun Li, Klara Nahrstedt