A key feature that distinguishes modern botnets from earlier counterparts is their increasing use of structured overlay topologies. This lets them carry out sophisticated coordina...
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
Abstract--Computer-centered services and broadband wireless connectivity are enabling the delivery of multimedia-based entertainment from the Internet to in-house wireless devices ...
Claudio E. Palazzi, Nicola Stievano, Marco Roccett...
—In this paper, we study the interactions of user-based congestion control algorithms and router-based switch scheduling algorithms. We show that switch scheduling algorithms tha...