Sciweavers

4052 search results - page 714 / 811
» Using RDF to describe networks
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
INFOCOM
2005
IEEE
15 years 3 months ago
Pollution in P2P file sharing systems
— One way to combat P2P file sharing of copyrighted content is to deposit into the file sharing systems large volumes of polluted files. Without taking sides in the file shar...
Jian Liang, Rakesh Kumar, Y. Xi, Keith W. Ross
ISSRE
2005
IEEE
15 years 3 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 3 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
HT
2005
ACM
15 years 3 months ago
Evaluation of adaptive hypermedia systems' conversion
Conversion between different adaptive hypermedia systems has barely been proposed, yet alone tested in realistic settings. This paper presents the evaluation of the interoperabili...
Alexandra I. Cristea, Helen Ashman, Craig D. Stewa...