Sciweavers

4305 search results - page 131 / 861
» Analysing Protocol Implementations
Sort
View
AIED
2005
Springer
14 years 2 months ago
Discovery of Patterns in Learner Actions
This paper describes an approach for analysis of computer-supported learning processes utilizing logfiles of learners’ actions. We provide help to researchers and teachers in ...
Andreas Harrer, Michael Vetter, Stefan Thür, ...
CCS
2006
ACM
14 years 23 days ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
NSDI
2008
13 years 11 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
CCS
2003
ACM
14 years 2 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
LCN
2005
IEEE
14 years 2 months ago
An End Host Multicast Protocol for Peer-to-Peer Networks
This paper presents a novel end host multicast protocol (DSM) on top of the mesh overlays for P2P networks. Unlike the previous schemes, the major feature of DSM is that it does n...
Wanqing Tu, Weijia Jia