Sciweavers

3581 search results - page 612 / 717
» Modeling the Internet
Sort
View
IPCCC
2007
IEEE
15 years 10 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
MMM
2007
Springer
127views Multimedia» more  MMM 2007»
15 years 10 months ago
Optimizing the Throughput of Data-Driven Based Streaming in Heterogeneous Overlay Network
Recently, much attention has been paid on data-driven (or swarm-like) based live streaming systems due to its rapid growth in deployment over Internet. In such systems, nodes rando...
Meng Zhang, Chunxiao Chen, Yongqiang Xiong, Qian Z...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Content Source Selection in Bluetooth Networks
—Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of ...
Liam McNamara, Cecilia Mascolo, Licia Capra
124
Voted
ECOWS
2007
Springer
15 years 10 months ago
Nonblocking Scheduling for Web Service Transactions
For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness o...
Mohammad Alrifai, Wolf-Tilo Balke, Peter Dolog, Wo...
EPEW
2007
Springer
15 years 10 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...