Sciweavers

5324 search results - page 716 / 1065
» Internet Security Protocols
Sort
View
CEAS
2007
Springer
15 years 10 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
DSN
2006
IEEE
15 years 10 months ago
Improving BGP Convergence Delay for Large-Scale Failures
Border Gateway Protocol (BGP) is the standard routing protocol used in the Internet for routing packets between the Autonomous Systems (ASes). It is known that BGP can take hundre...
Amit Sahoo, Krishna Kant, Prasant Mohapatra
SIGCOMM
2006
ACM
15 years 10 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
INFOCOM
2005
IEEE
15 years 10 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
ATAL
2003
Springer
15 years 9 months ago
Modifying agent systems for an open, dynamic agent environment
Most agent systems today are closed and static. That is, one uses Agent-Oriented Software Engineering techniques to build agent systems in which the set of agents is specified ahe...
Adam L. Berger, Robert R. Kessler