Sciweavers

176 search results - page 31 / 36
» On the fractal behavior of TCP
Sort
View
USS
2004
13 years 8 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
CN
2004
142views more  CN 2004»
13 years 7 months ago
Adaptive video streaming: pre-encoded MPEG-4 with bandwidth scaling
The increasing popularity of streaming video is a cause for concern for the stability of the Internet because most streaming video content is currently delivered via UDP, without ...
Alex Balk, Mario Gerla, Dario Maggiorini, M. Y. Sa...
WWW
2007
ACM
14 years 8 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
INFOCOM
2008
IEEE
14 years 1 months ago
Window Flow Control: Macroscopic Properties from Microscopic Factors
—This paper studies window flow control focusing on bridging the gap between microscopic factors such as burstiness in sub-RTT timescales, and observable macroscopic properties ...
Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, ...
AINA
2007
IEEE
14 years 1 months ago
VIP: a Virtual Interface-based aPproach for vertical handover in single-subnet networks
We propose a simple and practical solution, called the Virtual Interface-based aPproach (VIP), for seamless vertical handover in single-subnet networks. VIP combines a virtual int...
Wei-Cheng Xiao, Shih-Hsuan Tang, Cheng-Fu Chou