In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Abstract. Although many different types of technologies for information systems have evolved over the last decades (such as databases, video systems, the Internet and mobile telec...
Egbert G. T. Jaspers, Rob G. J. Wijnhoven, R. Albe...
In this position paper we motivate and describe the Congestion Manager (CM), a novel end-system architecture, which enables application adaptation to network congestion. The CM ma...
Hariharan Shankar Rahul, Hari Balakrishnan, Sriniv...
Current adaptive systems acquire information about users mainly by simple tracking of resources, a user has requested and by asking users to supply the needed information. In this ...