Sciweavers

1630 search results - page 91 / 326
» Secure Overlay Network Design
Sort
View
IC
2010
14 years 7 months ago
Distributed Algorithms for the Placement of Network Services
Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP (VoIP) conver...
Todd Sproull, Roger Chamberlain
IPTPS
2004
Springer
15 years 3 months ago
Rapid Mobility via Type Indirection
Economies of scale and advancements in wide-area wireless networking are leading to the availability of more small, networked mobile devices, placing higher stress on existing mob...
Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John K...
CLEIEJ
2010
14 years 7 months ago
Design, Implementation and Use of a Remote Network Lab with Multiple Users Support as an Aid Teaching Computer Networks
This article presents the design, implementation and use of a remote network lab with multiple users support as an aid to teaching computer networks. The purpose is to enable mult...
Marco Aravena Vivar, Cristian Rodriguez, Andres Ra...
WETICE
2007
IEEE
15 years 4 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
CCS
2009
ACM
15 years 10 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...