Sciweavers

1447 search results - page 167 / 290
» Simulating Internet Worms
Sort
View
ASIASIM
2004
Springer
15 years 7 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
BIOADIT
2004
Springer
15 years 7 months ago
Media Streaming on P2P Networks with Bio-inspired Cache Replacement Algorithm
With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata, ...
57
Voted
CEAS
2004
Springer
15 years 7 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li
151
Voted
DSRT
2003
IEEE
15 years 7 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller
DSRT
2003
IEEE
15 years 7 months ago
Peer-to-Peer Suitability for Collaborative Multiplayer Games
Peer-to-peer communication is emerging as one of the most potentially disruptive technologies in the networking sector. If the interest in such technologies as Napster, Morpheus a...
Abdulmotaleb El-Saddik, Andre Dufour