Sciweavers

897 search results - page 116 / 180
» History-based traffic control
Sort
View
COMCOM
2004
102views more  COMCOM 2004»
14 years 11 months ago
A scalable architecture for end-to-end QoS provisioning
The Differentiated Services (DiffServ) architecture has been proposed by the Internet Engineering Task Force as a scalable solution for providing end-to-end Quality of Service (Qo...
Spiridon Bakiras, Victor O. K. Li
GLOBECOM
2006
IEEE
15 years 5 months ago
Defending against Instant Messaging Worms
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Zhijun Liu, Guoqiang Shu, Na Li, David Lee
USENIX
2008
15 years 1 months ago
Remote Profiling of Resource Constraints of Web Servers Using Mini-Flash Crowds
Unexpected surges in Web request traffic can exercise server-side resources (e.g., access bandwidth, processing, storage etc.) in undesirable ways. Administrators today do not hav...
Pratap Ramamurthy, Vyas Sekar, Aditya Akella, Bala...
ETFA
2008
IEEE
15 years 28 days ago
Green surveillance applications
Currently, falling prices in technologies associated with surveillance applications has led to a huge increase in their use in all types of environments, although the most common ...
Javier Silvestre-Blanes
IEEESP
2008
136views more  IEEESP 2008»
14 years 11 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...