Sciweavers

1447 search results - page 245 / 290
» Simulating Internet Worms
Sort
View
CEAS
2008
Springer
15 years 1 months ago
Tracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Ka...
CCS
2006
ACM
15 years 1 months ago
Dynamic rule-ordering optimization for high-speed firewall filtering
Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices. The optimization of firewall policies is critica...
Hazem Hamed, Ehab Al-Shaer
FITRAMEN
2008
15 years 1 months ago
High-Performance H.264/SVC Video Communications in 802.11e Ad Hoc Networks
This work focuses on improving the performance of video communications based on the recently developed H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. Th...
Attilio Fiandrotti, Dario Gallucci, Enrico Masala,...
IE
2007
15 years 1 months ago
Through the looking glass: game worlds as representations and views from elsewhere
This paper describes the rationale and subsequent development stages of a work in progress: a graffiti toolkit for rich spatial 3D environments and an actual world mnemonic collec...
J. Turner, Nicola J. Bidwell
MMNS
2007
208views Multimedia» more  MMNS 2007»
15 years 1 months ago
Hybrid Overlay Networks Management for Real-Time Multimedia Streaming over P2P Networks
Recent growth of the multimedia content delivery over the Internet and the popularity of the peer-to-peer (P2P) architecture have opened new horizons for emerging novel services ov...
Mubashar Mushtaq, Toufik Ahmed