Sciweavers

183 search results - page 17 / 37
» Security Analysis and Configuration of Large Networks
Sort
View
LISA
2003
13 years 9 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
DSN
2005
IEEE
13 years 9 months ago
Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems
In general, decision support is one of the main purposes of model-based analysis of systems. Response surface methodology (RSM) is an optimization technique that has been applied ...
Peter Kemper, Dennis Müller, Axel Thümml...
CCS
2009
ACM
14 years 2 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ICDCSW
2007
IEEE
14 years 1 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
LCN
1994
IEEE
13 years 11 months ago
The Ethernet Capture Effect: Analysis and Solution
We analyze the behavior of the Ethernet in networks with a small number of active stations, and describe what is known as the Ethernet capture effect, where a station transmits co...
K. K. Ramakrishnan, Henry Yang