Sciweavers

111 search results - page 18 / 23
» Evaluating IPv6 Adoption in the Internet
Sort
View
GLOBECOM
2008
IEEE
14 years 9 months ago
Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks
Network and service providers are rapidly deploying IPTV networks to deliver a wide variety of video content to subscribers. Some video content may be protected by copyright and/or...
Yali Liu, Canhui Ou, Zhi Li, Cherita L. Corbett, C...
TON
2008
102views more  TON 2008»
14 years 9 months ago
Designing less-structured P2P systems for the expected high churn
Abstract--We address the problem of highly transient populations in unstructured and loosely-structured peer-to-peer systems. We propose a number of illustrative query-related stra...
Fabián E. Bustamante, Yi Qiao
OR
2011
Springer
14 years 4 months ago
Modeling an e-government observatory for rural SMEs using UML with RUP
Developing Web-based systems for agriculture and rural development requires the collaboration of experts from different scientific fields and backgrounds. Thus, it is crucial to ...
Sotiris Karetsos, Nikos Manouselis, Constantina Co...
WWW
2002
ACM
15 years 10 months ago
Protecting electronic commerce from distributed denial-of-service attacks
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to b...
José Carlos Brustoloni
IMC
2007
ACM
14 years 11 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum