Sciweavers

4262 search results - page 348 / 853
» Internet and Intranet Computing
Sort
View
VRML
2010
ACM
15 years 9 months ago
Shadow maps and projective texturing in X3D
We propose a number of X3D extensions to enable shadows in the virtual worlds. Our higher-level extensions are an easy way to request shadows independently of their implementation...
Michalis Kamburelis
119
Voted
APNOMS
2006
Springer
15 years 8 months ago
Novel Traffic Measurement Methodology for High Precision Applications Awareness in Multi-gigabit Networks
Traffic measurement research has focused on various aspects ranging from simple packet-based monitoring to sophisticated flow-based measurement and analysis. Especially, most recen...
Taesang Choi, Sangsik Yoon, Dongwon Kang, Sangwan ...
APNOMS
2006
Springer
15 years 8 months ago
Experiences in End-to-End Performance Monitoring on KOREN
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
Wang-Cheol Song, Deok-Jae Choi
DSN
2004
IEEE
15 years 8 months ago
Secure Distributed DNS
A correctly working Domain Name System (DNS) is essential for the Internet. Due to its significance and because of deficiencies in its current design, the DNS is vulnerable to a w...
Christian Cachin, Asad Samar
CEAS
2006
Springer
15 years 8 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...