Sciweavers

1447 search results - page 97 / 290
» Simulating Internet Worms
Sort
View
111
Voted
GLOBECOM
2008
IEEE
15 years 8 months ago
Friendly P2P: Application-Level Congestion Control for Peer-to-Peer Applications
Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng, Gw...
114
Voted
VRML
1999
ACM
15 years 6 months ago
A VRML Integration Methodology for Manufacturing Applications
This paper describes several methods for using the Virtual Reality Modeling Language (VRML) as the visualization integration technology for manufacturing simulation systems. One o...
Sandy Ressler, Afzal Godil, Qiming Wang, Gregory S...
121
Voted
KDD
2002
ACM
110views Data Mining» more  KDD 2002»
16 years 2 months ago
A model for discovering customer value for E-content
There exists a huge demand for multimedia goods and services in the Internet. Currently available bandwidth speeds can support sale of downloadable content like CDs, e-books, etc....
Srinivasan Jagannathan, Jayanth Nayak, Kevin C. Al...
112
Voted
CONEXT
2007
ACM
15 years 5 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure
COMCOM
2004
84views more  COMCOM 2004»
15 years 1 months ago
A dynamic pricing scheme for e-content at multiple levels-of-service
Businesses selling multimedia rich software or e-content are growing in the Internet. The e-content can be downloaded or streamed immediately after an on-line transaction. Since I...
Srinivasan Jagannathan, Kevin C. Almeroth