Sciweavers

2904 search results - page 70 / 581
» Internet Infrastructure Security
Sort
View
SIGCOMM
2006
ACM
14 years 5 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
CN
2002
109views more  CN 2002»
13 years 11 months ago
A network infrastructure for IP mobility support in metropolitan areas
The original design of the Internet and its underlying protocols did not anticipate users to be mobile. With the growing interest in supporting mobile users and mobile computing, ...
Cristina Hristea, Fouad A. Tobagi
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
14 years 3 months ago
A Cache Architecture for Modernizing the Usenet Infrastructure
Current Internet users see the combination of World-wide Web (WWW) and electronic mail as a synonym for the Internet. While WWW is excellent for easy and fast dissemination of inf...
Thomas Gschwind, Manfred Hauswirth
COMCOM
2004
95views more  COMCOM 2004»
13 years 11 months ago
A distributed middleware infrastructure for personalized services
In this paper, we present an overview of extensible Retrieval, Annotation and Caching Engine (eRACE), a modular and distributed intermediary infrastructure that collects informati...
Marios D. Dikaiakos, Demetrios Zeinalipour-Yazti
SAINT
2007
IEEE
14 years 5 months ago
Local Production, Local Consumption Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure
Peer-to-peer (P2P) is a system of overlay networks such that participants can potentially take symmetrical roles. This translates itself into a design based on the philosophy of L...
Kenji Saito, Eiichi Morino, Yoshihiko Suko, Takaak...