Sciweavers

3341 search results - page 583 / 669
» A Communication Virtual Machine
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 3 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
INFOCOM
2008
IEEE
14 years 3 months ago
Turbo King: Framework for Large-Scale Internet Delay Measurements
—Distance estimation and topological proximity in the Internet have recently emerged as important problems for many distributed applications [1], [10], [11], [19], [29], [31], [4...
Derek Leonard, Dmitri Loguinov
NOMS
2008
IEEE
14 years 3 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
Hierarchical and Breathing Peer-to-Peer SIP System
—The combination of the SIP-based service and Peer-to-Peer (P2P) can improve the performance of traditional client-server SIP system. However, current P2P SIP systems have many d...
Lifeng Le, Geng-Sheng Kuo