Sciweavers

186 search results - page 36 / 38
» On the use of anycast in DNS
Sort
View
ANSS
2005
IEEE
14 years 2 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
HICSS
2002
IEEE
117views Biometrics» more  HICSS 2002»
14 years 1 months ago
Dispute Resolution for gTLD Conflicts
Efficient and equitable dispute resolution is key to avoiding systemic disturbance in the use and valorization of top level domain names (TLDs). Such dispute resolution is also im...
Bruno de Vuyst
NSDI
2004
13 years 10 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
SIGCOMM
2003
ACM
14 years 1 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...