Sciweavers

1447 search results - page 35 / 290
» Simulating Internet Worms
Sort
View
MASCOTS
2008
15 years 1 months ago
Tackling the Memory Balancing Problem for Large-Scale Network Simulation
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Hyojeong Kim, Kihong Park
APNOMS
2006
Springer
15 years 3 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
DSRT
2004
IEEE
15 years 3 months ago
Virtual Reality Tools for Internet-Based Robotic Teleoperation
This paper describes the general system and software architecture for the Internet-based robotic teleoperation system using virtual reality tools. The existing technology and appl...
Xiaoli Yang, Qing Chen
CORR
2004
Springer
80views Education» more  CORR 2004»
14 years 11 months ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
SIGCOMM
2009
ACM
15 years 6 months ago
Modeling energy efficiency in wireless internet communication
For wireless mobile Internet users the length of the battery life is one of the most important performance factors. The energy efficiency of the data transmission over radio is a ...
Enrico Rantala, Arto Karppanen, Seppo Granlund, Pa...