Sciweavers

2562 search results - page 384 / 513
» An Internet without the Internet protocol
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
TCP-Africa: an adaptive and fair rapid increase rule for scalable TCP
— High capacity data transfers over the Internet routinely fail to meet end-to-end performance expectations. The default transport control protocol for best effort data traffic ...
R. King, Richard G. Baraniuk, Rudolf H. Riedi
LCN
2005
IEEE
14 years 3 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
NDSS
2005
IEEE
14 years 3 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
PDP
2005
IEEE
14 years 3 months ago
Rendezvous: An Alternative Approach to Conflict Resolution for Real Time Multi-User Applications
Up until now little support has been provided for shared state systems in environments with highly unpredictable network connections, such as mobile networks. Shared state conflic...
Angie Chandler, Joe Finney
QSHINE
2005
IEEE
14 years 3 months ago
Grido- An Architecture for a Grid-based Overlay Network
— Grido is an architecture that targets a network operator intending to provide enhanced services to its customers. This is achieved by setting up a “backbone” overlay networ...
Shirshanka Das, Alok Nandan, Michael G. Parker, Gi...