Sciweavers

680 search results - page 103 / 136
» Locating Hidden Servers
Sort
View
IPTPS
2003
Springer
15 years 2 months ago
Sloppy Hashing and Self-Organizing Clusters
We are building Coral, a peer-to-peer content distribution system. Coral creates self-organizing clusters of nodes that fetch information from each other to avoid communicating wi...
Michael J. Freedman, David Mazières
INFOCOM
2002
IEEE
15 years 2 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ICOIN
2001
Springer
15 years 2 months ago
Web-Based Distributed Topology Discovery of IP Networks
For the purpose of distributed network management, this paper employs a Web-based distributed network management architecture which uses the same HTTP protocol to download Java ap...
Hwa-Chun Lin, Yi-Fan Wang, Chien-Hsing Wang, Chien...
POLICY
2001
Springer
15 years 2 months ago
Policy Based SLA Management in Enterprise Networks
The Differentiated Services Architecture defines the mechanisms that are needed to offer multiple classes of services in an IP network. While this model offers significant scaling ...
Dinesh C. Verma, Mandis Beigi, Raymond B. Jennings...
ACSAC
2000
IEEE
15 years 2 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...