Sciweavers

2316 search results - page 421 / 464
» How Asymmetric Is the Internet
Sort
View
GROUP
2007
ACM
15 years 8 months ago
Beyond the lan: techniques from network games for improving groupware performance
Networked games can provide groupware developers with important lessons in how to deal with real-world networking issues such as latency, limited bandwidth and packet loss. Games ...
Jeff Dyck, Carl Gutwin, T. C. Nicholas Graham, Dav...
DSN
2004
IEEE
15 years 8 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
CCS
2008
ACM
15 years 6 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
NSDI
2010
15 years 5 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...
IMECS
2007
15 years 5 months ago
Web Service Integration Based on Abstract Forms in XML for End-user Initiative Development
ice Integration Based on Abstract Forms in XML for End-user Initiative Development Takeshi Chusho, Ryousuke Yuasa, Shinpei Nishida and Katsuya Fujiwara ∗ Abstract— The number o...
Takeshi Chusho, Ryousuke Yuasa, Shinpei Nishida, K...