Sciweavers

680 search results - page 83 / 136
» Locating Hidden Servers
Sort
View
CHI
1995
ACM
15 years 1 months ago
Hyper-G and harmony: towards the next generation of networked information technology
Current networked information systems on the Internet, whilst extremely successful, run into problems of fragmentation, consistency, scalability, and loss of orientation. The deve...
Keith Andrews, Frank Kappe, Hermann A. Maurer
CSREASAM
2006
14 years 11 months ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood
SERP
2003
14 years 11 months ago
Memory Access Characteristics of Network Infrastructure Applications
Network infrastructure is composed of various devices located either in the core or at the edges of a wide-area network. These devices are required to deliver high transaction thr...
Abdul Waheed
CN
2006
81views more  CN 2006»
14 years 9 months ago
On the universality of rank distributions of website popularity
We present an extensive analysis of long-term statistics of the queries to websites using logs collected on several web caches in Russian academic networks and on US IRCache cache...
Serge A. Krashakov, Anton B. Teslyuk, Lev N. Shchu...
COMCOM
2002
98views more  COMCOM 2002»
14 years 9 months ago
CDN brokering
Content distribution networks (CDNs) increase the capacity of individual Web sites and attempt to deliver content from caches that are located "closer" to end-users than...
Alexandros Biliris, Charles D. Cranor, Fred Dougli...