If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
In this paper we regard first the situation where parallel channels are disturbed by noise. With the goal of maximal information conservation we deduce the conditions for a transf...
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...
Deploying and managing wide-area network services is exceptionally challenging. Despite having servers at many locations, a service provider must rely on an underlying besteffort ...