Sciweavers

897 search results - page 89 / 180
» History-based traffic control
Sort
View
CCS
2006
ACM
15 years 2 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
CORR
2010
Springer
85views Education» more  CORR 2010»
14 years 11 months ago
Pushing BitTorrent Locality to the Limit
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, i...
Stevens Le-Blond, Arnaud Legout, Walid Dabbous
ISCC
2006
IEEE
114views Communications» more  ISCC 2006»
15 years 5 months ago
On Cooperative Inter-Domain Path Computation
Inter-domain path computation, or the ability to compute end-to-end paths across multiple domains, is the next step toward wide deployment of a distributed control plane with supp...
Payam Torab, Bijan Jabbari, Qian Xu, Shujia Gong, ...
CAISE
2005
Springer
15 years 4 months ago
System Ontology and its role in Software Development
The research reported upon in this paper aims at reducing errors in both the requirements engineering and the system specification phase of software development, by means of system...
Jan L. G. Dietz
CHI
1994
ACM
15 years 3 months ago
Issues and experience in designing two-handed interaction
Considering that direct manipulation interfaces using a pointing device could be more efficient with the addition of a second pointing device, we are designing and implementing tw...
Stéphane Chatty