Abstract—Advanced network and media applications such as multimedia streaming and Internet telephony are becoming an integral part of the Internet. Reservation protocols, such as...
Hromuzd Khosravi, Daniel Reininger, Maximilian Ott...
Existing low-latency protocols make unrealistically strong assumptions about reliability. This allows them to achieve impressive performance, but also prevents this performance bei...
Stephen R. Donaldson, Jonathan M. D. Hill, David B...
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
We present a framework for a low power self-tuning analog proportional-integral-derivative controller. By using a model-free tuning method, it overcomes problems associated with r...
Web servers must be protected from overload since server overload leads to low server throughput and increased response times experienced by the clients. Server overload occurs wh...