Sciweavers

5324 search results - page 939 / 1065
» Internet Security Protocols
Sort
View
QSHINE
2005
IEEE
14 years 1 months ago
Grido- An Architecture for a Grid-based Overlay Network
— Grido is an architecture that targets a network operator intending to provide enhanced services to its customers. This is achieved by setting up a “backbone” overlay networ...
Shirshanka Das, Alok Nandan, Michael G. Parker, Gi...
IMC
2005
ACM
14 years 1 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
MINENET
2005
ACM
14 years 1 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...
MINENET
2005
ACM
14 years 1 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
SIGCOMM
2005
ACM
14 years 1 months ago
Meridian: a lightweight network location service without virtual coordinates
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overla...
Bernard Wong, Aleksandrs Slivkins, Emin Gün S...