Sciweavers

785 search results - page 144 / 157
» Cache Behavior of Network Protocols
Sort
View
SIGMETRICS
2008
ACM
13 years 7 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
ICISS
2007
Springer
14 years 1 months ago
Investigating the Impact of Real-World Factors on Internet Worm Propagation
This paper reports the results of our experimentation with modeling worm behavior on a large scale, fully adaptable network simulator. Our experiments focused on areas of worm scan...
Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, J...
ICNP
2003
IEEE
14 years 23 days ago
A File-Centric Model for Peer-to-Peer File Sharing Systems
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative ...
Li Zou, Mostafa H. Ammar
LCN
2003
IEEE
14 years 23 days ago
PURPLE: Predictive Active Queue Management Utilizing Congestion Information
Active Queue Management (AQM) is an attempt to find a delicate balance between two antagonistic Internet queuing requirements: First, buffer space should be maximized to accommod...
Roman Pletka, Marcel Waldvogel, Soenke Mannal
ENTCS
2007
94views more  ENTCS 2007»
13 years 7 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand