Sciweavers

1447 search results - page 135 / 290
» Simulating Internet Worms
Sort
View
93
Voted
WISE
2006
Springer
15 years 7 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the user...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...
VRST
2006
ACM
15 years 7 months ago
P2P Network for very large virtual environment
The ever increasing speed of Internet connections has led to a point where it is actually possible for every end user to seamlessly share data on Internet. Peer-To-Peer (P2P) netw...
Romain Cavagna, Christian Bouville, Jér&oci...
110
Voted
WOWMOM
2006
ACM
94views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Performance Analysis and Enhancement of the Next Generation Cellular Networks
— As more and more wireless subscribers access the Internet through cellular networks, Internet data traffic, which is known to be long range dependent (LRD), will soon dominate...
Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu
INFOCOM
2005
IEEE
15 years 7 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
112
Voted
IPCCC
2005
IEEE
15 years 7 months ago
Utilizing characteristics of last link to improve TCP performance
TCP, perhaps the most widely used transport protocol, was designed for wired links and stationary hosts. But more and more links with different characteristics are used to access...
Xiuchao Wu, I. Biswas, Mun Choon Chan, Akkihebbal ...