Sciweavers

785 search results - page 113 / 157
» Cache Behavior of Network Protocols
Sort
View
AAMAS
2006
Springer
13 years 7 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
INFOCOM
2007
IEEE
14 years 1 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
CCR
2008
109views more  CCR 2008»
13 years 7 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
IPCCC
1999
IEEE
13 years 12 months ago
Measurement, analysis and performance improvement of the Apache Web server
Performance of Web servers is critical to the success of many corporations and organizations. However, very few results have been published that quantitatively study the server be...
Yiming Hu, Ashwini K. Nanda, Qing Yang
MOBIHOC
2010
ACM
13 years 5 months ago
Whirlpool routing for mobility
We present the Whirlpool Routing Protocol (WARP), which efficiently routes data to a node moving within a static mesh. The key insight in WARP's design is that data traffic c...
Jung Woo Lee, Branislav Kusy, Tahir Azim, Basem Sh...