Sciweavers

468 search results - page 29 / 94
» Distributed Worm Simulation with a Realistic Internet Model
Sort
View
ESORICS
2009
Springer
16 years 3 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
111
Voted
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
15 years 8 months ago
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
Luciano Bononi, Nicola Concer
RTAS
2005
IEEE
15 years 8 months ago
Optimal Time-Variant Resource Allocation for Internet Servers with Delay
The increasing popularity of high-volume performancecritical Internet applications calls for a scalable server design that allows meeting individual response-time guarantees. Cons...
Xiliang Zhong, Cheng-Zhong Xu, Minghua Xu, Jianbin...
121
Voted
HPDC
2006
IEEE
15 years 8 months ago
XtremLab: A System for Characterizing Internet Desktop Grids
Desktop grid (DG) systems use the idle computing power of many volunteered desktop PC’s on the Internet to support large-scale computation and storage. For over a decade, DG sys...
Paul Malecot, Derrick Kondo, Gilles Fedak
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 9 days ago
A Fluid Background Traffic Model
Background traffic has a significant impact on the behavior of network services and protocols. However, a detailed model of the background traffic can be extremely time consuming i...
Ting Li, Jason Liu