Sciweavers

1018 search results - page 191 / 204
» Towards a new Internet architecture
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
INFOCOM
2009
IEEE
15 years 4 months ago
Using NEMO to Support the Global Reachability of MANET Nodes
—Mobile Ad hoc Network (MANET) routing protocols have been the focus of an accomplished research effort for many years within the networking community and now the results of this...
Ben McCarthy, Christopher Edwards, Martin Dunmore
ICDCS
2008
IEEE
15 years 4 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
ICIW
2008
IEEE
15 years 4 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...
SIGCOMM
2006
ACM
15 years 3 months ago
Systematic topology analysis and generation using degree correlations
Researchers have proposed a variety of metrics to measure important graph properties, for instance, in social, biological, and computer networks. Values for a particular graph met...
Priya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall...