Sciweavers

1477 search results - page 90 / 296
» Token flow control
Sort
View
LCN
2006
IEEE
15 years 9 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
138
Voted
ICAC
2006
IEEE
15 years 9 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
131
Voted
CACM
2005
74views more  CACM 2005»
15 years 3 months ago
Separate handles from names on the internet
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. ...
Michael J. O'Donnell
116
Voted
IWQOS
2005
Springer
15 years 9 months ago
Processor Sharing Flows in the Internet
Most congestion control algorithms try to emulate processor sharing (PS) by giving each competing flow an equal share of a bottleneck link. This approach leads to fairness, and pr...
Nandita Dukkipati, Masayoshi Kobayashi, Rui Zhang-...
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
15 years 10 months ago
A hopf-algebraic formula for compositions of noncommuting flows
Abstract— The Chen-Fliess series is known to be an exponential Lie series. Previously explicit formulas for the iterated integral coefficients were known only for its factorizat...
Eric Gehrig, Matthias Kawski