Sciweavers

58 search results - page 8 / 12
» Amongst First-Class Protocols
Sort
View
LCN
2005
IEEE
14 years 1 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
ATAL
2004
Springer
14 years 1 months ago
The Advantages of Compromising in Coalition Formation with Incomplete Information
This paper presents protocols and strategies for coalition formation with incomplete information under time constraints. It focuses on strategies for coalition members to distribu...
Sarit Kraus, Onn Shehory, Gilad Taase
WCW
2004
Springer
14 years 1 months ago
Overhaul: Extending HTTP to Combat Flash Crowds
The increasing use of the web for serving http content, for database transactions, etc. can place heavy stress on servers. Flash crowds can occur at a server when there is a burst ...
Jay A. Patel, Indranil Gupta
BTW
2003
Springer
110views Database» more  BTW 2003»
14 years 27 days ago
The IOP Approach to Enterprise Frameworks
Abstract: This paper introduces the Internet Operating Platform (IOP), an enterprise framework for large scale software development. In addition to obeying to important standards (...
Udo Nink, Stefan Schäfer
ICCCN
2007
IEEE
13 years 11 months ago
Load-aware Traffic Engineering for Mesh Networks
Abstract--The static nature of mesh nodes imposes requirements for designing routing metrics that support high throughput and low packet delay. This paper considers the problem of ...
Devu Manikantan Shila, Tricha Anjali