Sciweavers

2316 search results - page 370 / 464
» How Asymmetric Is the Internet
Sort
View
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 10 months ago
Linguistic and Cultural Differences in Information Categorization and Their Impact on Website Use
The Internet is increasingly used as a medium for providing medical information. Nevertheless, whether the World Wide Web is favoured over other information sources depends to a l...
Anett Kralisch, Alvin W. Yeo, Nurfauza Jali
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...
IPPS
2006
IEEE
15 years 10 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
ISCC
2006
IEEE
134views Communications» more  ISCC 2006»
15 years 10 months ago
A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger
240
Voted
P2P
2006
IEEE
101views Communications» more  P2P 2006»
15 years 10 months ago
Towards Scalable Mobility in Distributed Hash Tables
For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, ...
Olaf Landsiedel, Stefan Götz, Klaus Wehrle