Sciweavers

785 search results - page 94 / 157
» Cache Behavior of Network Protocols
Sort
View
NDSS
2005
IEEE
15 years 8 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
123
Voted
ISCC
2002
IEEE
108views Communications» more  ISCC 2002»
15 years 7 months ago
An integrated architecture for the scalable delivery of semi-dynamic Web content
The competition on clients attention requires sites to update their content frequently. As a result, a large percentage of web pages are semi-dynamic, i.e., change quite often and...
Danny Dolev, Osnat Mokryn, Yuval Shavitt, Innocent...
HPCA
1996
IEEE
15 years 6 months ago
Improving Release-Consistent Shared Virtual Memory Using Automatic Update
Shared virtual memory is a software technique to provide shared memory on a network of computers without special hardware support. Although several relaxed consistency models and ...
Liviu Iftode, Cezary Dubnicki, Edward W. Felten, K...
139
Voted
HOTNETS
2010
14 years 9 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
118
Voted
AINA
2004
IEEE
15 years 6 months ago
Mobile IPv6 Extensions to support Nested Mobile Networks
Unlike host mobility support, network mobility is concerned with situations where an entire network changes its point of attachment to the Internet. Furthermore, we should conside...
ZhiJun Gu, Dongmin Yang, Cheeha Kim