Sciweavers

1447 search results - page 122 / 290
» Simulating Internet Worms
Sort
View
INFOCOM
1999
IEEE
15 years 6 months ago
The ENTRAPID Protocol Development Environment
As Internet services rapidly become an essential part of the global infrastructure, it is necessary for the protocols underlying these services to be robust and failsafe. To achiev...
X. W. Huang, Rosen Sharma, Srinivasan Keshav
SEC
2004
15 years 3 months ago
Spam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, hav...
Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Ni...
TELSYS
2008
70views more  TELSYS 2008»
15 years 1 months ago
On the traffic modeling of burst aggregation algorithms using video and data traces
We obtain analytically the delay per packet in a burst for the three burst aggregation algorithms: Time based, Burst Length based and mixed Time and Burst Length based, assuming r...
Xenia Mountrouidou
313
Voted
IAJIT
2011
14 years 5 months ago
DWT-based audio watermarking
: Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking....
Ali Al-Haj, Ahmad A. Mohammad, Lama Bata
WWW
2008
ACM
16 years 2 months ago
Anycast CDNS revisited
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...