Sciweavers

2562 search results - page 133 / 513
» An Internet without the Internet protocol
Sort
View
DISCEX
2003
IEEE
14 years 3 months ago
Cooperative Response Strategies for Large Scale Attack Mitigation
We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a...
D. Nojiri, Jeff Rowe, Karl N. Levitt
CEAS
2006
Springer
14 years 2 months ago
Email Thread Reassembly Using Similarity Matching
Email thread reassembly is the task of linking messages by parentchild relationships. In this paper, we present two approaches to address this problem. One exploits previously und...
Jen-Yuan Yeh
ICIW
2007
IEEE
13 years 10 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
NSDI
2007
14 years 20 days ago
A Systematic Framework for Unearthing the Missing Links: Measurements and Impact
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-d...
Yihua He, Georgos Siganos, Michalis Faloutsos, Sri...
WWW
2001
ACM
14 years 11 months ago
Objectifying the Web the Light Way: an RDF-based Framework for the Description of Web Objects
The advantages of object-oriented (OO) programming are well-known. Nevertheless, distributed OO middleware systems (OOM) such as CORBA, DCOM or Java RMI have not been widely adopt...
Pasqualino Assini