Sciweavers

1447 search results - page 282 / 290
» Simulating Internet Worms
Sort
View
CN
2006
61views more  CN 2006»
14 years 9 months ago
Structuring topologically aware overlay networks using domain names
Abstract-- Overlay networks are application layer systems which facilitate users in performing distributed functions such as searches over the contents of other users. An important...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki
93
Voted
CN
2006
106views more  CN 2006»
14 years 9 months ago
Model-based end-to-end available bandwidth inference using queueing analysis
End-to-end available bandwidth estimation between Internet hosts is important to understand network congestion and enhance the performance of Quality-of-Service (QoS) demanding ap...
Xiaojun Hei, Brahim Bensaou, Danny H. K. Tsang
CORR
2006
Springer
107views Education» more  CORR 2006»
14 years 9 months ago
Optimal Scheduling of Peer-to-Peer File Dissemination
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Intern...
Jochen Mundinger, Richard R. Weber, Gideon Weiss
72
Voted
IJNSEC
2008
124views more  IJNSEC 2008»
14 years 9 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...