Sciweavers

382 search results - page 53 / 77
» Tracing Network Attacks to Their Sources
Sort
View
PDCAT
2007
Springer
14 years 1 months ago
Realistic Evaluation of Interconnection Network Performance at High Loads
Any simulation-based evaluation of an interconnection network proposal requires a good characterization of the workload. Synthetic traffic patterns based on independent traffic so...
Francisco Javier Ridruejo Perez, Javier Navaridas,...
TMC
2011
201views more  TMC 2011»
13 years 2 months ago
Data Delivery Properties of Human Contact Networks
—Pocket Switched Networks take advantage of social contacts to opportunistically create data paths over time. This work employs empirical traces to examine the effect of the huma...
Nishanth Sastry, D. Manjunath, Karen R. Sollins, J...
ICDCS
2002
IEEE
14 years 15 days ago
Query Optimization to Meet Performance Targets for Wide Area Applications
Recent technology advances have enabled mediated query processing with Internet accessible WebSources. A characteristic of WebSources is that their access costs exhibit transient ...
Vladimir Zadorozhny, Louiqa Raschid
CSMR
2004
IEEE
13 years 11 months ago
Tool Support for Traceable Product Evolution
In software product families, the full benefit of reuse can only be achieved if traceability of requirements to architecture, components and further down to source code is support...
Patricia Lago, Eila Niemelä, Hans van Vliet
TON
2002
99views more  TON 2002»
13 years 7 months ago
Beyond folklore: observations on fragmented traffic
Fragmented IP traffic is a poorly understood component of the overall mix of traffic on the Internet. Many assertions about the nature and extent of fragmented traffic are anecdota...
Colleen Shannon, David Moore, Kimberly C. Claffy