Sciweavers

358 search results - page 46 / 72
» Protocols from perceptual observations
Sort
View
DSN
2006
IEEE
15 years 1 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
P2P
2010
IEEE
150views Communications» more  P2P 2010»
14 years 8 months ago
Spotify -- Large Scale, Low Latency, P2P Music-on-Demand Streaming
Abstract—Spotify is a music streaming service offering lowlatency access to a library of over 8 million music tracks. Streaming is performed by a combination of client-server acc...
Gunnar Kreitz, Fredrik Niemelä
ACC
2011
65views more  ACC 2011»
13 years 10 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
GLOBECOM
2006
IEEE
15 years 4 months ago
Toward Understanding the Behavior of BGP During Large-Scale Power Outages
— While the Internet continues to thrive, the resiliency of its fundamental routing infrastructure is not fully understood. In this paper, we analyze the behavior of the de facto...
Jun Li, Zhen Wu, Eric Purpus
LCN
2005
IEEE
15 years 3 months ago
Light-Trail Networks: Design and Survivability
The light-trail architecture provides a novel solution to address IP-centric issues at the optical layer. By incorporating drop and continue functionality, overlaid with a lightwe...
Srivatsan Balasubramanian, Wensheng He, Arun K. So...