Sciweavers

169 search results - page 11 / 34
» Peer-to-Peer Communication Across Network Address Translator...
Sort
View
WETICE
2007
IEEE
15 years 3 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
INFOCOM
2010
IEEE
14 years 8 months ago
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta
P2P
2003
IEEE
146views Communications» more  P2P 2003»
15 years 2 months ago
The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery
The peer-to-peer (P2P) model generally requires that bidirectional and direct communications for contentdelivery be set up between user peers after discovery of the desired conten...
Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira ...
AICCSA
2008
IEEE
301views Hardware» more  AICCSA 2008»
14 years 11 months ago
Cooperative criminal face recognition in distributed web environment
This paper presents a multi-agent framework for distributed web-based face recognition using fuzzy logic based result fusion mechanism. The model is designed in JADE framework and...
Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad...
NOSSDAV
2004
Springer
15 years 3 months ago
Connectivity restrictions in overlay multicast
A large number of overlay multicast protocols have been developed, almost all of which assume universal connectivity between end hosts. However, in reality, this assumption is not...
Aditya Ganjam, Hui Zhang