Sciweavers

2316 search results - page 366 / 464
» How Asymmetric Is the Internet
Sort
View
123
Voted
ICNP
2007
IEEE
15 years 11 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Content Source Selection in Bluetooth Networks
—Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of ...
Liam McNamara, Cecilia Mascolo, Licia Capra
139
Voted
MSS
2007
IEEE
109views Hardware» more  MSS 2007»
15 years 11 months ago
Performance Evaluation of Multiple TCP connections in iSCSI
Scaling data storage is a significant concern in enterprise systems and Storage Area Networks (SANs) are deployed as a means to scale enterprise storage. SANs based on Fibre Chan...
Bhargava K. Kancherla, Ganesh M. Narayan, K. Gopin...
SOCA
2007
IEEE
15 years 11 months ago
Creating Web Services From GUI-Based Applications
— Graphical User Interface (GUI) APplications (GAPs) are ubiquitous and provide various services. However, it is difficult to make GAPs exchange information (i.e., interoperate)...
Mark Grechanik, Kevin M. Conroy, Kishore S. Swamin...
AINTEC
2007
Springer
15 years 10 months ago
Gap Analysis in IP Multicast Dissemination
Abstract. IP multicast is advantageous for high quality streaming applications and future needs in the Internet. However, it is generally recognized that IP multicast requires sign...
Hitoshi Asaeda, Bill Manning