Sciweavers

751 search results - page 117 / 151
» Internet inter-domain traffic
Sort
View
DISCEX
2003
IEEE
14 years 27 days ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
SIGCOMM
1998
ACM
13 years 12 months ago
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Abstract—The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to ...
Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Bro...
CONEXT
2007
ACM
13 years 11 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
13 years 11 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
DL
1995
Springer
120views Digital Library» more  DL 1995»
13 years 11 months ago
A New Zealand Digital Library for Computer Science Research
: A large amount of computing literature has become available over the Internet, as university departments and research institutions have made their technical reports, preprints, a...
Ian H. Witten, Sally Jo Cunningham, Mahendra Valla...