Sciweavers

NCA
2009
IEEE
14 years 6 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal
NCA
2009
IEEE
14 years 6 months ago
A Distributed Algorithm for Web Content Replication
—Web caching and replication techniques increase accessibility of Web contents and reduce Internet bandwidth requirements. In this paper, we are considering the replica placement...
Sharrukh Zaman, Daniel Grosu
NCA
2009
IEEE
14 years 6 months ago
Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless Networks
—A transport layer protocol supporting multihoming allows an application to transmit data via multiple paths simultaneously (termed concurrent multipath transfer, or CMT for shor...
Ilknur Aydin, Chien-Chung Shen
NCA
2009
IEEE
14 years 6 months ago
Seed Scheduling for Peer-to-Peer Networks
—The initial phase in a content distribution (file sharing) scenario is delicate due to the lack of global knowledge and the dynamics of the overlay. An unwise distribution of t...
Flavio Esposito, Ibrahim Matta, Pietro Michiardi, ...
NCA
2009
IEEE
14 years 6 months ago
Functional and Performance Analysis of CalRadio 1 Platform
— CalRadio 1 is an open 802.11b-compatible development platform, designed and developed at UCSD with the aim of providing the research community with an open and fully reprogramm...
Riccardo Manfrin, Andrea Zanella, Michele Zorzi
NCA
2009
IEEE
14 years 6 months ago
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Serv
Abstract—Resource management is a key challenge that service providers must adequately face in order to ensure their profitability. This paper describes a proof-of-concept frame...
Iñigo Goiri, Ferran Julià, Jorge Eja...
NCA
2009
IEEE
14 years 6 months ago
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization
: © Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner HP Laboratories HPL-2009-115 device dri...
Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio ...
NCA
2009
IEEE
14 years 6 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal
NCA
2009
IEEE
14 years 6 months ago
QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast
—This paper presents QuoCast, a resource-aware protocol for reliable stream diffusion in unreliable environments, where processes may crash and communication links may lose messa...
Mouna Allani, Benoît Garbinato, Amirhossein ...