Sciweavers

8770 search results - page 1392 / 1754
» Named Service Networking
Sort
View
GLOBECOM
2009
IEEE
15 years 7 months ago
Fast Admission Control for Short TCP Flows
—Over the last decade, numerous admission control schemes have been studied to allocate network resources. Although per-flow control schemes can provide guaranteed QoS, such sch...
Yingxin Jiang, Aaron Striegel
CCS
2008
ACM
15 years 6 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
CONEXT
2008
ACM
15 years 6 months ago
ISP-friendly peer matching without ISP collaboration
In peer-to-peer (P2P) systems, a receiver needs to be matched with multiple senders, because peers have limited capacity and reliability. Efficient peer matching can reduce the co...
Cheng-Hsin Hsu, Mohamed Hefeeda
DIMVA
2007
15 years 5 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
HCI
2007
15 years 5 months ago
Online Analysis of Hierarchical Events in Meetings
Automatic online analysis of meetings is very important from three points of view: serving as an important archive of a meeting, understanding human interaction processes, and prov...
Xiang Zhang, Guangyou Xu, Xiaoling Xiao, Linmi Tao
« Prev « First page 1392 / 1754 Last » Next »