Sciweavers

9359 search results - page 1728 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
SIGCOMM
2006
ACM
14 years 2 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
SIGCOMM
2006
ACM
14 years 2 months ago
Interference-aware fair rate control in wireless sensor networks
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
Sumit Rangwala, Ramakrishna Gummadi, Ramesh Govind...
SIGCOMM
2006
ACM
14 years 2 months ago
Drafting behind Akamai (travelocity-based detouring)
To enhance web browsing experiences, content distribution networks (CDNs) move web content “closer” to clients by caching copies of web objects on thousands of servers worldwi...
Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovi...
SIGCOMM
2006
ACM
14 years 2 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
SIGECOM
2006
ACM
93views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
The sequential auction problem on eBay: an empirical analysis and a solution
Bidders on eBay have no dominant bidding strategy when faced with multiple auctions each offering an item of interest. As seen through an analysis of 1,956 auctions on eBay for a...
Adam I. Juda, David C. Parkes
« Prev « First page 1728 / 1872 Last » Next »