Sciweavers

42738 search results - page 8258 / 8548
» Search Computing Systems
Sort
View
CSE
2009
IEEE
15 years 10 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
DSN
2009
IEEE
15 years 10 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
ICAC
2009
IEEE
15 years 10 months ago
vManage: loosely coupled platform and virtualization management in data centers
: © vManage: Loosely Coupled Platform and Virtualization Management in Data Centers Sanjay Kumar, Vanish Talwar, Vibhore Kumar, Parthasarathy Ranganathan, Karsten Schwan HP Labora...
Sanjay Kumar, Vanish Talwar, Vibhore Kumar, Partha...
NCA
2009
IEEE
15 years 10 months ago
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET
Abstract— The Virtual Node Layer (VNLayer) is a programtraction for Mobile Ad Hoc Networks (MANETs). It defines simple virtual servers at fixed locations in a network, addressi...
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvi...
NDSS
2009
IEEE
15 years 10 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson
« Prev « First page 8258 / 8548 Last » Next »