The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
Complex systems researchers have looked to the Internet as a possible source of interesting emergent behaviour. Indeed, some high profile failures, and some low level phenomena, m...
— This paper studies load balancing for multipath Internet routing. We focus on hash-based load balancing algorithms that work on the flow level to avoid packet reordering which...
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli, R...
Abstract— Inter-component communication has received considerable attention by robotic software architects as various frameworks and toolkits have matured. While the resulting pl...
Anthony Cowley, Hwa-Chow Oliver Hsu, Camillo J. Ta...