The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated ...
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, Jo...
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Autonomic computing has attracted large amount of attention as a novel computing paradigm in the past few years. In this paper, we explore the inherent accordance between autonomi...
Jin Wang, Brian J. d'Auriol, Young-Koo Lee, Sungyo...