Sciweavers

546 search results - page 34 / 110
» Understanding Current IPv6 Performance: A Measurement Study
Sort
View
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ASPLOS
2012
ACM
12 years 4 months ago
Clearing the clouds: a study of emerging scale-out workloads on modern hardware
Emerging scale-out workloads require extensive amounts of computational resources. However, data centers using modern server hardware face physical constraints in space and power,...
Michael Ferdman, Almutaz Adileh, Yusuf Onur Ko&cce...
ACSAC
2010
IEEE
13 years 6 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
TCSV
2002
132views more  TCSV 2002»
13 years 8 months ago
A study of real-time packet video quality using random neural networks
An important and unsolved problem today is the automatic quantification of the quality of video flows transmitted over packet networks. In particular, the ability to perform this ...
Samir Mohamed, Gerardo Rubino
CCR
1998
85views more  CCR 1998»
13 years 8 months ago
Experimentations with TCP selective acknowledgment
This paper reports our experimentation results with TCP Selective Acknowledgments TCP-Sack, which became an Internet Proposed Standard protocol recently. To understand the perfo...
Renaud Bruyeron, Bruno Hemon, Lixia Zhang