Sciweavers

4922 search results - page 195 / 985
» Internet time out
Sort
View
SAINT
2008
IEEE
15 years 10 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
EPEW
2006
Springer
15 years 8 months ago
Experimental Analysis of the Correlation of HTTP GET Invocations
In this paper we experimentally investigate if optimal retry times can be determined based on models that assume independence of successive tries. We do this using data obtained fo...
Philipp Reinecke, Aad P. A. van Moorsel, Katinka W...
CORR
2006
Springer
95views Education» more  CORR 2006»
15 years 4 months ago
A Markov Chain based method for generating long-range dependence
This paper describes a model for generating time series which exhibit the statistical phenomenon known as long-range dependence (LRD). A Markov Modulated Process based upon an inf...
Richard G. Clegg, Maurice Dodson
P2P
2010
IEEE
115views Communications» more  P2P 2010»
15 years 2 months ago
IMP: ISP-Managed P2P
—Internet Service Providers (ISPs) have failed to reduce the cost of peer-to-peer (P2P) traffic. Traffic throttling devices increase user download times, and caches store content...
Shakir James, Patrick Crowley
AMC
2005
154views more  AMC 2005»
15 years 4 months ago
An improvement of the Yang-Shieh password authentication schemes
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-ba...
Chou Chen Yang, Ren-Chiun Wang, Ting Yi Chang