Sciweavers

4922 search results - page 810 / 985
» Internet time out
Sort
View
120
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
IPPS
2010
IEEE
15 years 1 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...
ISW
2010
Springer
15 years 1 months ago
An Analysis of DepenDNS
Recently, a new scheme to protect clients against DNS cache poisoning attacks was introduced. The scheme is referred to as DepenDNS and is intended to protect clients against such ...
Nadhem J. AlFardan, Kenneth G. Paterson
MASS
2010
150views Communications» more  MASS 2010»
15 years 1 months ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang
130
Voted
SECON
2010
IEEE
15 years 1 months ago
Using BGP in a Satellite-Based Challenged Network Environment
Once, satellites were considered an important option for creating global Internet access. However, for a period of time, satellites were supplanted by other ground-based technologi...
Roman Chertov, Kevin C. Almeroth