Sciweavers

1447 search results - page 241 / 290
» Simulating Internet Worms
Sort
View
SIGCOMM
2004
ACM
15 years 5 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
SIGCOMM
2004
ACM
15 years 5 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
SIGMETRICS
2004
ACM
125views Hardware» more  SIGMETRICS 2004»
15 years 5 months ago
A hybrid direct-indirect estimator of network internal delays
The network tomography problem requires a remote source to estimate network-internal statistics on individual links within the network. Several techniques have been proposed to pe...
Kostas G. Anagnostakis, Michael Greenwald
WWW
2004
ACM
15 years 5 months ago
Flexible on-device service object replication with replets
An increasingly large amount of such applications employ service objects such as Servlets to generate dynamic and personalized content. Existing caching infrastructures are not we...
Dong Zhou, Nayeem Islam, Ali Ismael
CIT
2004
Springer
15 years 5 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem