Sciweavers

4262 search results - page 43 / 853
» Internet and Intranet Computing
Sort
View
LISA
2000
15 years 3 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
CCR
2006
110views more  CCR 2006»
15 years 2 months ago
Estimating network proximity and latency
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
Puneet Sharma, Zhichen Xu, Sujata Banerjee, Sung-J...
CHI
2006
ACM
16 years 2 months ago
Poultry.Internet: a remote human-pet interaction system
Keng Soon Teh, Shang Ping Lee, Adrian David Cheok
ICAC
2006
IEEE
15 years 8 months ago
Autonomic Management of Internet Services: Experience with Self-Optimization
Sara Bouchenak, Noel De Palma, Daniel Hagimont, Sa...
ICCS
2001
Springer
15 years 6 months ago
Validation Web Site: A Combustion Collaboratory over the Internet
Angela Violi, Xiaodong Chen, Gary Lindstrom, Eric ...