Sciweavers

381 search results - page 13 / 77
» host 2008
Sort
View
ICC
2008
IEEE
167views Communications» more  ICC 2008»
14 years 2 months ago
Traceroute-Based Topology Inference without Network Coordinate Estimation
Abstract— Underlay topology information is important to construct efficient overlay networks. To achieve end-to-end network topology inference among a group of hosts, traceroute...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
IJSN
2007
73views more  IJSN 2007»
13 years 7 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
SIROCCO
2008
13 years 9 months ago
Distributed Approximation Algorithm for Resource Clustering
In this paper, we consider the clustering of resources on large scale platforms. More precisely, we target parallel applications consisting of independant tasks, where each task is...
Olivier Beaumont, Nicolas Bonichon, Philippe Ducho...
CACM
2002
77views more  CACM 2002»
13 years 7 months ago
Security considerations for remote electronic voting
This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections ...
Aviel D. Rubin
ITIIS
2010
131views more  ITIIS 2010»
13 years 6 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...