Sciweavers

5324 search results - page 793 / 1065
» Internet Security Protocols
Sort
View
INFOCOM
1997
IEEE
14 years 2 months ago
An Empirical Model of HTTP Network Traffic
The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies ...
Bruce A. Mah
SIGCOMM
1995
ACM
14 years 2 months ago
Two Issues in Reservation Establishment
This paper addresses two issues related to resource reservation establishment in packet switched networks o ering realtime services. The rst issue arises out of the natural tensi...
Scott Shenker, Lee Breslau
GLOBECOM
2009
IEEE
14 years 2 months ago
Protecting SIP against Very Large Flooding DoS Attacks
—The use of the Internet for VoIP communications has seen an important increase over the last few years, with the Session Initiation Protocol (SIP) as the most popular protocol u...
Felipe Huici, Saverio Niccolini, Nico d'Heureuse
DSRT
2008
IEEE
14 years 17 days ago
Evaluating Large Scale Distributed Simulation of P2P Networks
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...
OSDI
2000
ACM
14 years 4 days ago
Overcast: Reliable Multicasting with an Overlay Network
Overcast is an application-level multicasting system that can be incrementally deployed using today's Internet infrastructure. These properties stem from Overcast's impl...
John Jannotti, David K. Gifford, Kirk L. Johnson, ...