Sciweavers

2804 search results - page 542 / 561
» Next Generation Internet
Sort
View
AP2PS
2009
IEEE
14 years 3 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
14 years 3 months ago
Knowledge Discovery from Citation Networks
—Knowledge discovery from scientific articles has received increasing attentions recently since huge repositories are made available by the development of the Internet and digit...
Zhen Guo, Zhongfei Zhang, Shenghuo Zhu, Yun Chi, Y...
INFOCOM
2009
IEEE
14 years 3 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
ICIDS
2009
Springer
14 years 3 months ago
Say Anything: A Demonstration of Open Domain Interactive Digital Storytelling
Say Anything is a text-based interactive digital storytelling application that differs from other systems in its emphasis on the ability of users to create a narrative in any domai...
Reid Swanson, Andrew S. Gordon
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 3 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky