Sciweavers

442 search results - page 24 / 89
» Technology choice and timing with positive network effects
Sort
View
CEAS
2007
Springer
15 years 6 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
IMC
2007
ACM
15 years 1 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
87
Voted
ICNP
2005
IEEE
15 years 5 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 6 months ago
On the Accuracy of an Indoor Location-sensing Technique Suitable for Impulse Radio Networks
An impulse radio indoor mapping and positioning technique has been proposed. This technique enables impulse radios to use the times of arrival (TOAs) of dominant echoes from the su...
Wenyu Guo, Nicholas P. Filer
INFOCOM
2010
IEEE
14 years 9 months ago
Tracking Long Duration Flows in Network Traffic
We propose the tracking of long duration flows as a new network measurement primitive. Long-duration flows are characterized by their long lived nature in time, and may not have hi...
Aiyou Chen, Yu Jin, Jin Cao