Sciweavers

2316 search results - page 161 / 464
» How Asymmetric Is the Internet
Sort
View
124
Voted
ICC
2009
IEEE
100views Communications» more  ICC 2009»
15 years 11 months ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
NTMS
2008
IEEE
15 years 11 months ago
Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems
—Peer-to-Peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual In...
Krzysztof Walkowiak
ICC
2007
IEEE
199views Communications» more  ICC 2007»
15 years 11 months ago
7DS - Node Cooperation and Information Exchange in Mostly Disconnected Networks
— When the node density in a network decreases below the level necessary to sustain ad-hoc and mesh networks, communication can succeed only by leveraging node mobility and trans...
Suman Srinivasan, Arezu Moghadam, Se Gi Hong, Henn...
123
Voted
ICPADS
2007
IEEE
15 years 11 months ago
Performance analysis on mobile agent-based parallel information retrieval approaches
—The main concern of the Internet user-base has shifted from what kind of information are available to how to find the desired information on the Internet thanks to the explosiv...
Wenyu Qu, Masaru Kitsuregawa, Keqiu Li
129
Voted
CEAS
2007
Springer
15 years 10 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton