Sciweavers

2316 search results - page 411 / 464
» How Asymmetric Is the Internet
Sort
View
RAID
2010
Springer
15 years 2 months ago
Behavior-Based Worm Detectors Compared
Abstract. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as...
Shad Stafford, Jun Li
TPDS
2010
103views more  TPDS 2010»
15 years 2 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
TROB
2010
83views more  TROB 2010»
15 years 2 months ago
Passive-Set-Position-Modulation Framework for Interactive Robotic Systems
—We propose a novel framework, passive set-position modulation (PSPM), which enables us to connect a (continuoustime) robot’s position to a sequence of slowly-updating/sparse (...
Dongjun Lee, Ke Huang
USAB
2010
15 years 2 months ago
An Experimental Investigation of the Akamai Adaptive Video Streaming
Akamai oers the largest Content Delivery Network (CDN) service in the world. Building upon its CDN, it recently started to offer High Denition (HD) video distribution using HTTP-...
Luca De Cicco, Saverio Mascolo
ACSAC
2010
IEEE
15 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria