Sciweavers

785 search results - page 135 / 157
» Cache Behavior of Network Protocols
Sort
View
IMC
2005
ACM
14 years 1 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
INFOCOM
2000
IEEE
13 years 12 months ago
Consideration of Receiver Interest for IP Multicast Delivery
—Large-scale applications are characterized by a large number of dynamic and often interactive group members. The nature of these applications is such that participants are not i...
Brian Neil Levine, Jon Crowcroft, Christophe Diot,...
ACSAC
2001
IEEE
13 years 11 months ago
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server workloads to cause devastation to the service providers. We propose a distribute...
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John ...
FORTE
2008
13 years 9 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
FCT
1997
Springer
13 years 11 months ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis