Sciweavers

2316 search results - page 454 / 464
» How Asymmetric Is the Internet
Sort
View
CCR
2010
202views more  CCR 2010»
15 years 4 months ago
Understanding data center traffic characteristics
As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In th...
Theophilus Benson, Ashok Anand, Aditya Akella, Min...
COMCOM
2008
147views more  COMCOM 2008»
15 years 4 months ago
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infra...
Azzedine Boukerche, Horacio A. B. F. de Oliveira, ...
110
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 4 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
136
Voted
CORR
2010
Springer
85views Education» more  CORR 2010»
15 years 4 months ago
Pushing BitTorrent Locality to the Limit
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, i...
Stevens Le-Blond, Arnaud Legout, Walid Dabbous
CACM
2006
102views more  CACM 2006»
15 years 4 months ago
Infoglut
whose titles and abstracts sound very interesting, the pile of unread reports continues to grow on the table in my office." (How quaint the terminology: mail and electronic me...
Peter J. Denning