Sciweavers

2316 search results - page 406 / 464
» How Asymmetric Is the Internet
Sort
View
FUIN
2006
97views more  FUIN 2006»
15 years 4 months ago
Thread Algebra with Multi-Level Strategies
In a previous paper, we developed an algebraic theory about threads and multi-threading based on the assumption that a deterministic interleaving strategy determines how threads ar...
Jan A. Bergstra, C. A. Middelburg
CN
2007
90views more  CN 2007»
15 years 4 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
CN
2007
96views more  CN 2007»
15 years 4 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
IEPOL
2006
67views more  IEPOL 2006»
15 years 4 months ago
Platform competition and broadband uptake: Theory and empirical evidence from the European union
Broadband access provides users with high speed, always-on connectivity to the Internet. Due to its superiority, broadband is seen as the way for consumers and firms to exploit th...
Walter Distaso, Paolo Lupi, Fabio M. Manenti
JCP
2008
121views more  JCP 2008»
15 years 4 months ago
Fuzzy Logic Bandwidth Prediction and Policing in a DiffServ-Aware Network
Differentiated Services (DiffServ)-aware network potentially can provide the next generation platform for multimedia support in the Internet. In this work we look at improving band...
Norashidah Md Din, Norsheila Fisal