Sciweavers

1447 search results - page 191 / 290
» Simulating Internet Worms
Sort
View
ICC
2007
IEEE
15 years 8 months ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 8 months ago
On Ameliorating the Perceived Playout Quality in Chunk-Driven P2P Media Streaming Systems
— Media streaming applications are becoming very popular in the Internet world. Since they mainly rely on a not scalable client/server model, the P2P model is receiving more and ...
Marco Furini
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 8 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
ICC
2007
IEEE
15 years 8 months ago
Supporting VCR Functions in P2P VoD Services Using Ring-Assisted Overlays
—Peer-to-Peer (P2P) networks have been shown to be a promising approach to providing large-scale Video-on-Demand (VoD) services over the Internet for their potential scalability....
Bin Cheng, Hai Jin, Xiaofei Liao
ICCCN
2007
IEEE
15 years 8 months ago
Grid Computing on Massively Multi-User Online Platform
—Large-scale online applications such as Massively Multiplayer Online Games (MMOGs) require large amount of computing resources that support many players interacting simultaneous...
Y. C. Allen Yu, Ka Lun Eddie Law