Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
When making an engineering design decision, it is often necessary to consider its implications on both system performance and dependability. In this paper, we present a performabi...
Ann T. Tai, William H. Sanders, Leon Alkalai, Savi...
Reliable multicast delivery requires that a multicast message be received by all members in a group. Hence certain or all members need to buffer messages for possible retransmissi...
This paper examines the effect of technology scaling and microarchitectural trends on the rate of soft errors in CMOS memory and logic circuits. We describe and validate an end-to...
Premkishore Shivakumar, Michael Kistler, Stephen W...
We consider the following problem for wireless ad hoc networks: assume n nodes, each capable of communicating with nodes within a radius of r, are distributed in a ddimensional re...
This paper deals with the performance analysis of a system modeled by a queue. If we are interested in occupation problems and if we look at the transient phase, then it makes sen...
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
For service applications on a network, measuring availability, performance, and quality of service is critical. Yet traditional software and hardware measures are both inadequate ...
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...