Sciweavers

2409 search results - page 120 / 482
» Reverse engineering the Internet
Sort
View
FTCS
1998
83views more  FTCS 1998»
15 years 5 months ago
The SunSCALR Framework for Internet Servers
Internet servers need to be highly-available, inexpensive, and scalable. These goals are often con icting and most designs meet, with limited success, only few of them. In this pa...
Ashish Singhai, Swee Boon Lim, Sanjay R. Radia
CCR
2005
64views more  CCR 2005»
15 years 4 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 11 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
DSN
2002
IEEE
15 years 9 months ago
Pinpoint: Problem Determination in Large, Dynamic Internet Services
Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today’s large, distributed, and dynamic application e...
Mike Y. Chen, Emre Kiciman, Eugene Fratkin, Armand...
PST
2004
15 years 5 months ago
Determining Internet Users' Values for Private Information
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...