Sciweavers

468 search results - page 29 / 94
» Distributed Worm Simulation with a Realistic Internet Model
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
14 years 1 months ago
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
Luciano Bononi, Nicola Concer
RTAS
2005
IEEE
14 years 28 days ago
Optimal Time-Variant Resource Allocation for Internet Servers with Delay
The increasing popularity of high-volume performancecritical Internet applications calls for a scalable server design that allows meeting individual response-time guarantees. Cons...
Xiliang Zhong, Cheng-Zhong Xu, Minghua Xu, Jianbin...
HPDC
2006
IEEE
14 years 1 months ago
XtremLab: A System for Characterizing Internet Desktop Grids
Desktop grid (DG) systems use the idle computing power of many volunteered desktop PC’s on the Internet to support large-scale computation and storage. For over a decade, DG sys...
Paul Malecot, Derrick Kondo, Gilles Fedak
ICC
2009
IEEE
139views Communications» more  ICC 2009»
13 years 5 months ago
A Fluid Background Traffic Model
Background traffic has a significant impact on the behavior of network services and protocols. However, a detailed model of the background traffic can be extremely time consuming i...
Ting Li, Jason Liu