Sciweavers

1162 search results - page 228 / 233
» Evaluation of network impact of content distribution mechani...
Sort
View
CCS
2004
ACM
15 years 2 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
EUROPAR
2009
Springer
15 years 4 months ago
Adaptive Peer Sampling with Newscast
Abstract. The peer sampling service is a middleware service that provides random samples from a large decentralized network to support gossip-based applications such as multicast, ...
Norbert Tölgyesi, Márk Jelasity
COMCOM
2007
82views more  COMCOM 2007»
14 years 9 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana
108
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
MobiStream: Error-Resilient Video Streaming in Wireless WANs Using Virtual Channels
—We present MobiStream— a video streaming system that exploits the perceptual value in video content and the characteristics of the link layer and physical layer channels to en...
Rajiv Chakravorty, Suman Banerjee, Samrat Ganguly
EUROSYS
2009
ACM
15 years 1 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...