Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
Abstract: Advances in technology now make it possible to integrate hundreds of cores (e.g. general or special purpose processors, embedded memories, application specific components...
This paper describes two methods for analyzing interactions in collaborative virtual environments (CVEs): one whereby quantitative data are captured, interaction is categorized in...
Performance of WLANs has been extensively studied during the past few years. While the focus has mostly been on isolated cells, the coverage of WLANs is in practice most often rea...