This paper describes an approach for analysis of computer-supported learning processes utilizing logfiles of learners’ actions. We provide help to researchers and teachers in ...
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
This paper presents a novel end host multicast protocol (DSM) on top of the mesh overlays for P2P networks. Unlike the previous schemes, the major feature of DSM is that it does n...