Networked games can provide groupware developers with important lessons in how to deal with real-world networking issues such as latency, limited bandwidth and packet loss. Games ...
Jeff Dyck, Carl Gutwin, T. C. Nicholas Graham, Dav...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
ice Integration Based on Abstract Forms in XML for End-user Initiative Development Takeshi Chusho, Ryousuke Yuasa, Shinpei Nishida and Katsuya Fujiwara ∗ Abstract— The number o...