Abstract—Digital media companies have recently started embracing P2P networks as an alternative distribution mechanism. However, with current P2P swarming systems users need to d...
As modern computing clusters used in scientific computing applications scale to ever-larger sizes and capabilities, their operational energy costs have become prohibitive. While ...
S. Conner, Sayaka Akioka, Mary Jane Irwin, Padma R...
Peer-to-Peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for Multiplayer Onl...
Hai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei L...
Testing for time-related behaviors of PLC software is important and should be performed carefully. We propose a structural testing technique on Function Block Diagram(FBD) network...
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...