|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2976 occurrences of 1432 keywords
|
|
|
Results
Found 2900 publication records. Showing 2900 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
73 | Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino |
Extracting Worm-Infected Hosts Using White List. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 68-75, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Byung-Won On, Myong-Soon Park |
A Reliable Multicast Protocol in Networks with Mobile Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOA ![In: International Symposium on Distributed Objects and Applications, DOA 2000, Antwerp, Belgium, September 21-23, 2000, pp. 27-, 2000, IEEE Computer Society, 0-7695-0819-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
66 | Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqiang Xiong, Qian Zhang 0001 |
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1537-1540, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Grenville J. Armitage |
Maximising student exposure to networking using FreeBSD virtual hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 33(3), pp. 137-143, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
virtual hosts, networking, Unix, IP, teaching, students, FreeBSD |
61 | Taku Noguchi, Miki Yamamoto |
Robust Application-Level Multicast Tree Construction for Wireless/Mobile Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWIC ![In: Wired/Wireless Internet Communications, 4th International Conference, WWIC 2006, Bern, Switzerland, May 10-12, 2006, Proceedings, pp. 108-119, 2006, Springer, 3-540-34023-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Yaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller |
Cryptographic support for fault-tolerant distributed computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996, Connemara, Ireland, September 9-11, 1996, pp. 109-114, 1996, ACM. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
56 | DongJin Lee, Nevil Brownlee |
A Methodology for Finding Significant Network Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 981-988, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
significant host, monitoring, rank, attribute, score |
56 | Keisuke Ishibashi, Tatsuya Mori, Ryoichi Kawahara, Yutaka Hirokawa, Atsushi Kobayashi, Kimihiro Yamamoto, Hitoaki Sakamoto |
Estimating Top N Hosts in Cardinality Using Small Memory Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 29, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 23-34, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
51 | Frank Dabek, Russ Cox, M. Frans Kaashoek, Robert Tappan Morris |
Vivaldi: a decentralized network coordinate system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 15-26, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Vivaldi, internet topology, network coordinates |
50 | Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble |
Measuring and analyzing the characteristics of Napster and Gnutella hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(2), pp. 170-184, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 251-256, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | W. Q. Cheng, Jian Gong, Wei Ding 0001 |
Identifying BT-like P2P Traffic by the Discreteness of Remote Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 237-238, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
concurrent flows, discreteness of remote hosts, P2P, traffic characteristics, traffic identification |
48 | Joris Claessens, Bart Preneel, Joos Vandewalle |
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 3(1), pp. 28-48, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
electronic transactions, Mobile agent security, malicious hosts |
48 | Karthik Lakshminarayanan, Venkata N. Padmanabhan |
Some findings on the network performance of broadband hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, IMC 2003, Miami Beach, FL, USA, October 27-29, 2003, pp. 45-50, 2003, ACM, 1-58113-773-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
broadband hosts, network measurement |
45 | Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada |
Early containment of worms using dummy addresses and connection trace back. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 13th International Conference on Parallel and Distributed Systems, ICPADS 2007, Hsinchu, Taiwan, December 5-7, 2007, pp. 1-8, 2007, IEEE Computer Society, 978-1-4244-1889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi |
Constructing internet coordinate system based on delay measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 13(3), pp. 513-525, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet, network topology, modeling techniques, measurement techniques |
45 | Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi |
Constructing internet coordinate system based on delay measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, IMC 2003, Miami Beach, FL, USA, October 27-29, 2003, pp. 129-142, 2003, ACM, 1-58113-773-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
internet distance service, principal component analysis, coordinate system |
45 | Biljana Cubaleska, Weidong Qiu, Markus Schneider 0002 |
How to Play Sherlock Holmes in the World of Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 449-463, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Bamba Gueye, Artur Ziviani, Mark Crovella, Serge Fdida |
Constraint-based geolocation of internet hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 14(6), pp. 1219-1232, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet, geolocation, delay measurement, multilateration, position measurement |
44 | Kyu-Han Kim, Kang G. Shin |
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6-8, 2005, pp. 107-120, 2005, ACM, 1-931971-31-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Chia-Cheng Hu, Eric Hsiao-Kuang Wu, Gen-Huey Chen, Chiang Jui-Hao |
Mobility-Aware On-demand Global Hosts for Ad-Hoc Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 375-384, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble |
King: estimating latency between arbitrary internet end hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Workshop ![In: Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, IMW 2002, Marseille, France, November 6-8, 2002, pp. 5-18, 2002, ACM, 1-58113-603-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
latency measurement tool, recursive DNS |
44 | Anup Kumar Talukdar, B. R. Badrinath, Arup Acharya |
Integrated services packet networks with mobile hosts: Architecture and performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 5(2), pp. 111-124, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
42 | Xuan Shangguan, Winston Khoon Guan Seah, Chi Chung Ko |
Performance evaluation of a lightweight resource reservation protocol for mobile Internet hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMCSA ![In: 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2000), 7-8 December 2000, Monterey, CA, USA, pp. 119-, 2000, IEEE Computer Society, 0-7695-0816-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
telecommunication signalling, lightweight resource reservation protocol, mobile Internet hosts, Integrated Services model, IntServ model, receiver-initiated reservation mechanism, soft state mechanism, large groups, dynamic group membership, heterogeneous receiver requirements, protocol complexity, processing overhead, storage overhead, sender-initiated reservation mechanism, lightweight signalling protocol, SMRP, Sender-initiated and Mobility-support Reservation Protocol, quality of service, performance evaluation, performance evaluation, Internet, mobile computing, scalability, protocols, resource allocation, multimedia communication, data flow, service quality, multimedia traffic, RSVP, network routers |
39 | Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan |
A Distributed Approach to End-to-End Network Topology Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1704-1709, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Venkata N. Padmanabhan, Sriram Ramabhadran, Jitendra Padhye |
NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTPS ![In: Peer-to-Peer Systems IV, 4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers, pp. 80-92, 2005, Springer, 3-540-29068-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Ioannis Chatzigiannakis, Sotiris E. Nikoletseas, Paul G. Spirakis |
An Efficient Communication Strategy for Ad-hoc Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 15th International Conference, DISC 2001, Lisbon, Portugal, October 3-5, 2001, Proceedings, pp. 285-299, 2001, Springer, 3-540-42605-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Wonyong Yoon, Dongman Lee, Chansu Yu, Myungchul Kim |
Tree-Based Reliable Multicast in Combined Fixed/Mobile IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 478-487, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Warren H. Debany Jr. |
Modeling the spread of internet worms via persistently unpatched hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 22(2), pp. 26-32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada |
Optimum Identification of Worm-Infected Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPOM ![In: IP Operations and Management, 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings, pp. 103-116, 2008, Springer, 978-3-540-87356-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sampling, detection, Worm, optimum design |
39 | Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan Saha |
On suitability of Euclidean embedding of internet hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo, France, June 26-30, 2006, pp. 157-168, 2006, ACM, 1-59593-319-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Euclidean embedding, suitability, triangle inequality |
39 | Cristian Hesselman, Henk Eertink, Ing Widya, Erik Huizer |
Delivering Live Multimedia Streams to Mobile Hosts in a Wireless Internet with Multiple Content Aggregators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(3), pp. 327-339, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multimedia content distribution, mobility, wireless networking |
37 | Volker Roth 0002, Vania Conan |
Encrypting Java Archives and Its Application to Mobile Agent Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AgentLink ![In: Agent Mediated Electronic Commerce, The European AgentLink Perspective., pp. 229-239, 2001, Springer, 3-540-41671-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Java Archives, encryption, mobile agent security, malicious hosts |
37 | Masaki Aida, Noriyuki Takahashi |
Evaluation of the number of destination hosts for data networking and its application to address cache design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 342-349, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
destination hosts, address cache design, address cache tables capacity, large-scale computer communication networks, packet destination addresses, cache hit probability, aging algorithm, probability, Zipf's law, data networking |
37 | Simon J. Lai, Arkady B. Zaslavsky, G. M. Martin |
A simulation model of adaptive protocols in distributed computing systems with mobile hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 28st Annual Simulation Symposium (SS '95), April 25-28, 1995, Santa Barbara, California, USA, pp. 220-227, 1995, IEEE Computer Society, 0-8186-7091-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
adaptive queuing protocol, distributed multidatabase environment, distributed databases, transport protocols, adaptive systems, digital simulation, mobile communication, simulation model, network operating systems, distributed computing systems, database applications, distributed operating systems, portable computers, microcomputers, mobile hosts, mobile computing environment, adaptive protocols, mobile radio |
34 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 207-227, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Hiroaki Kikuchi, Masato Terada |
How Many Malicious Scanners Are in the Internet? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 381-390, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Pradeep Kyasanur, Nitin H. Vaidya |
Selfish MAC Layer Misbehavior in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 4(5), pp. 502-516, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Wireless communication, network monitoring, network-level security and protection, public networks |
34 | Alfandika Nyandoro, Mahbub Hassan |
Exploiting capture effect to provide service differentiation in wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall (2) ![In: Proceedings of the 60th IEEE Vehicular Technology Conference, VTC Fall 2004, 26-29 September 2004, Los Angeles, CA, USA, pp. 1174-1178, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Gurmeet Singh Manku |
Balanced binary trees for ID management and load balance in distributed hash tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, PODC 2004, St. John's, Newfoundland, Canada, July 25-28, 2004, pp. 197-205, 2004, ACM, 1-58113-802-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID management, peer to peer, load balance, P2P, DHT, distributed hash table, binary tree |
34 | KiCheoul Wang, Gihwan Cho |
Two Phases Based Cluster Formation Scheme for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part I, pp. 194-206, 2003, Springer, 3-540-40194-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Hideki Shimada, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda |
Evaluation of a Location Management System for Wireless Communicating Mobile Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN (2) ![In: Information Networking, Wireless Communications Technologies and Network Applications, International Conference, ICOIN 2002, Cheju Island, Korea, January 30 - February 1, 2002, Revised Papers, Part II, pp. 154-164, 2002, Springer, 3-540-44255-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Edith Cohen, Haim Kaplan, Uri Zwick |
Connection caching under vaious models of communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: Proceedings of the Twelfth annual ACM Symposium on Parallel Algorithms and Architectures, SPAA 2000, Bar Harbor, Maine, USA, July 9-13, 2000, pp. 54-63, 2000, ACM, 1-58113-185-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan Saha, Mukund Srinivasan |
Fundamental Effects of Clustering on the Euclidean Embedding of Internet Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 890-901, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Kyu-Han Kim, Yujie Zhu, Raghupathy Sivakumar, Hung-Yun Hsieh |
A Receiver-Centric Transport Protocol for Mobile Hosts with Heterogeneous Wireless Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 11(4), pp. 363-382, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
server migration, heterogeneous wireless networks, seamless handoff, bandwidth aggregation, multi-homed mobile host |
33 | Gabriel Ciobanu, Danut Rusu |
Self-organizing Distribution of Agents over Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 462-471, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama, Masahiro Ishino, Haruhiko Ohshima, Ichiro Mizukoshi |
Detecting mass-mailing worm infected hosts by mining DNS traffic data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005, pp. 159-164, 2005, ACM, 1-59593-026-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
mass-mailing worm, data mining, domain name system |
33 | Gilles Berger-Sabbatel, Andrzej Duda, Martin Heusse, Franck Rousseau |
Short-Term Fairness of 802.11 Networks with Several Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Mobile and Wireless Communication Networks, IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), October 25-27, 2004, Paris, France, pp. 263-274, 2004, Kluwer/Springer, 0-387-23148-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fairness of 802.11, Wireless LANs, Network measurements, CSMA/CA |
33 | Bamba Gueye, Artur Ziviani, Mark Crovella, Serge Fdida |
Constraint-based geolocation of internet hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 288-293, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
geolocation, delay measurements, multilateration |
33 | Hung-Yun Hsieh, Kyu-Han Kim, Yujie Zhu, Raghupathy Sivakumar |
A receiver-centric transport protocol for mobile hosts with heterogeneous wireless interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14-19, 2003, pp. 1-15, 2003, ACM, 1-58113-753-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
server migration, heterogeneous wireless networks, seamless handoff, bandwidth aggregation, multi-homed mobile host |
33 | Abhishek Agrawal, Henri Casanova |
Clustering Hosts in P2P and Global Computing Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 12-15 May 2003, Tokyo, Japan, pp. 367-373, 2003, IEEE Computer Society, 0-7695-1919-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings, pp. 289-292, 2003, Springer, 3-540-40522-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, 5th International Workshop, MATA 2003, Marakech, Morocco, October 8-10, 2003, Proceedings, pp. 286-295, 2003, Springer, 3-540-20298-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Yoshinari Suzuki, Susumu Ishihara, Tadanori Mizuno |
Reassignment of Mediation Function between Hosts on Mobile Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN (2) ![In: Information Networking, Wireless Communications Technologies and Network Applications, International Conference, ICOIN 2002, Cheju Island, Korea, January 30 - February 1, 2002, Revised Papers, Part II, pp. 288-299, 2002, Springer, 3-540-44255-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Masahiro Tamori, Susumu Ishihara, Takashi Watanabe 0001, Tadanori Mizuno |
A Replica Distribution Method with Consideration of the Positions of Mobile Hosts on Wireless Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 331-335, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Eun-Young Park, Jae-Hwoon Lee, Byoung-Gu Choe |
An IPv4-to-IPv6 dual stack transition mechanism supporting transparent connections between IPv6 hosts and IPv4 hosts in integrated IPv6/IPv4 network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2004, Paris, France, 20-24 June 2004, pp. 1024-1027, 2004, IEEE, 0-7803-8533-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz |
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 12-27, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code passing, collusion attack, Mobile agent security, malicious hosts |
31 | Philip K. McKinley, Udiyan I. Padmanabhan |
Design of Composable Proxy Filters for Heterogeneous Mobile Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 16-19 April 2001, Phoenix, AZ, USA, Proceedings, pp. 494-501, 2001, IEEE Computer Society, 0-7695-1080-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
heterogeneous collaborative computing, object-oriented design, forward error correction, wireless local area networks, Adaptive middleware, mobile hosts |
28 | Rein Vesilo |
Asymptotic Analysis of Load Distribution for Size-Interval Task Allocation with Bounded Pareto Job Sizes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 129-137, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | John S. Heidemann, Yuri Pryadkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, Joseph A. Bannister |
Census and survey of the visible internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, IMC 2008, Vouliagmeni, Greece, October 20-22, 2008, pp. 169-182, 2008, ACM, 978-1-60558-334-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
census, internet address allocation, survey, firewalls, ipv4 |
28 | Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Richard R. Brooks |
Performance aware secure code partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 1122-1127, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | David M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders |
Modeling and analysis of worm defense using stochastic activity networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 349-355, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
28 | Keisuke Ishibashi, Tatsuya Mori, Ryoichi Kawahara, Katsuyasu Toyama, Shunichi Osawa, Shoichiro Asano |
2-D Bitmap for Summarizing Inter-Host Communication Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 83, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | John Bethencourt, Wai Yong Low, Isaac Simmons, Matthew Williamson |
Establishing darknet connections: an evaluation of usability and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 145-146, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuya Shirai, Hideo Saito, Kenjiro Taura |
A fast topology inference: a building block for network-aware parallel processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 25-29 June 2007, Monterey, California, USA, pp. 11-22, 2007, ACM, 978-1-59593-673-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
measurements, broadcast, topology inference |
28 | Weigang Wu, Jiannong Cao 0001, Jin Yang 0005, Michel Raynal |
A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 14th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2006), 15-17 February 2006, Montbeliard-Sochaux, France, pp. 64-72, 2006, IEEE Computer Society, 0-7695-2513-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee |
An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 206-221, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Rohan Sen, Gregory Hackmann, Gruia-Catalin Roman, Christopher D. Gill |
Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang Li 0001, Robert Tappan Morris |
Practical, distributed network coordinates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 34(1), pp. 113-118, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Zouheir Trabelsi, Hamza Rahmani |
Detection of Sniffers in an Ethernet Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 170-182, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Matthew J. Miller, Nitin H. Vaidya |
Power Save Mechanisms for Multi-Hop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 1st International Conference on Broadband Networks (BROADNETS 2004), 25-29 October 2004, San Jose, CA, USA, pp. 518-526, 2004, IEEE Computer Society, 0-7695-2221-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Cristian Hesselman, Henk Eertink, Ing Widya, Erik Huizer |
A mobility-aware broadcasting infrastructure for a wireless internet with hotspots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2003, San Diego, CA, USA, September 19, 2003, pp. 103-112, 2003, ACM, 1-58113-768-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hotspots/overlays, multimedia broadcasting, mobility, negotiation |
28 | Tsz Kin Ho, Jack Y. B. Lee |
A Row-Permutated Data Reorganization Algorithm for Growing Server-less Video-on-Demand Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 12-15 May 2003, Tokyo, Japan, pp. 44-51, 2003, IEEE Computer Society, 0-7695-1919-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
Protocols for Malicious Host Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 191-201, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Biljana Cubaleska, Markus Schneider 0002 |
Applying Trust Policies for Protecting Mobile Agents Against DoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 198-201, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Klaus Haller, Heiko Schuldt |
Using Predicates for Specifying Targets of Migration and Messages in a Peer-to-Peer Mobile Agent Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Agents ![In: Mobile Agents, 5th International Conference, MA 2001 Atlanta, GA, USA, December 2-4, 2001, Proceedings, pp. 152-168, 2001, Springer, 3-540-42952-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Kostas P. Hatzis, George P. Pentaris, Paul G. Spirakis, Basil Tampakas |
Counting in Mobile Networks: Theory and Experimentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAE ![In: Algorithm Engineering, 3rd International Workshop, WAE '99, London, UK, July 19-21, 1999, Proceedings, pp. 95-109, 1999, Springer, 3-540-66427-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Hae-Sun Shin, Gyeong-Hun Kim, Se-Jin Hwang, A-Rum Jun, Gun-Hee Kim, Myong-Soon Park |
An Effective Cache-Index Forwarding over Wireless Network for the World-Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: International Conference on Parallel and Distributed Systems, ICPADS '98, Tainan, Taiwan, December 14-16, 1998, pp. 549-, 1998, IEEE Computer Society, 0-8186-8603-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Hari Balakrishnan, Mark Stemm, Srinivasan Seshan, Randy H. Katz |
Analyzing Stability in Wide-Area Network Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, Seattle, Washington, USA, June 15-18, 1997, pp. 2-12, 1997, ACM, 0-89791-909-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Internet |
28 | Chad D. Mano, Andrew Blaich, Qi Liao 0002, Yingxin Jiang, David A. Cieslak, David Salyers, Aaron Striegel |
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(2), pp. 2:1-2:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
rogue systems, network security, traffic conditioning |
28 | Zhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, Raghupathy Sivakumar, Aravind Velayutham |
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 45-52, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Sanmin Liu, Hai Jin 0001, Xiaofei Liao, Hong Yao, Deze Zeng |
TCPBridge: A software approach to establish direct communications for NAT hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 247-252, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Xiaoxin Yin, William Yurcik, Adam J. Slagell |
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 284-295, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Bamba Gueye, Steve Uhlig, Artur Ziviani, Serge Fdida |
Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 319-330, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
buffering delay estimation, geolocation, traceroute, multilateration |
28 | Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Richard R. Brooks, Ibrahim Kolcu |
Secure Execution of Computations in Untrusted Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe 2006, 11th Ada-Europe International Conference on Reliable Software Technologies, Porto, Portugal, June 5-9, 2006, Proceedings, pp. 106-118, 2006, Springer, 3-540-34663-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Simon Schütz, Lars Eggert, Stefan Schmid 0002, Marcus Brunner |
Protocol enhancements for intermittently connected hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 35(3), pp. 5-18, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
disruption tolerance, internet, transport protocols, mobile communication, intermittent connectivity, communication system performance |
28 | Khaled Salah 0001 |
An Analytical Model for Evaluating Interrupt-Driven System Performance of Gigabit Ethernet Hosts with Finite Buffer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 983-988, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Seung-Jei Yang, Sung-Han Park |
An Enhanced Multicast Routing Protocol for Mobile Hosts in IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 1031-1038, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Malohat Ibrohimovna Kamilova, Cristian Hesselman, Ing Widya, Erik Huizer |
Adding Policy-Based Control to Mobile Hosts Switching between Streaming Proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 243-246, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Bamba Gueye, Artur Ziviani, Serge Fdida, José Ferreira de Rezende, Otto Carlos Muniz Bandeira Duarte |
Two-Tier Geographic Location of Internet Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSNMC ![In: High Speed Networks and Multimedia Communications, 7th IEEE International Conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, Proceedings, pp. 730-739, 2004, Springer, 3-540-22262-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Norihisa Matsumoto, Yuki Moritani |
Experiments with SCTP Multi-path Access for Single-Homed Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 800-809, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 14th International Conference, DEXA 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 927-936, 2003, Springer, 3-540-40806-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Steven M. Bellovin |
A technique for counting natted hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Workshop ![In: Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, IMW 2002, Marseille, France, November 6-8, 2002, pp. 267-272, 2002, ACM, 1-58113-603-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Ramachandran Ramjee, Li Li 0002, Thomas F. La Porta, Sneha Kumar Kasera |
IP paging service for mobile hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16-21, 2001., pp. 332-345, 2001, ACM, 1-58113-422-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
IP |
28 | Venkata N. Padmanabhan, Lakshminarayanan Subramanian |
An investigation of geographic mapping techniques for internet hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 27-31, 2001, San Diego, CA, USA, pp. 173-185, 2001, ACM, 1-58113-411-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Internet |
28 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Untrusted Hosts and Confidentiality: Secure Program Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 18th ACM Symposium on Operating System Principles, SOSP 2001, Chateau Lake Louise, Banff, Alberta, Canada, October 21-24, 2001, pp. 1-14, 2001, ACM, 1-58113-389-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Sarantis Paskalis, Alexandros Kaloxylos, Evangelos Zervas |
An Efficient QoS Scheme for Mobile Hosts . ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 14-16 November 2001, Tampa, Florida, USA, Proceedings, pp. 630-637, 2001, IEEE Computer Society, 0-7695-1321-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Mahesh Kalyanakrishnan, Ravishankar K. Iyer, Jaqdish U. Patel |
Reliability of Internet Hosts - A Case Study from the End User's Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 418-423, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, George Varghese |
Network monitoring using traffic dispersion graphs (tdgs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 315-320, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
behavioral approach, hosts' connection graphs, network traffic visualization, network monitoring |
Displaying result #1 - #100 of 2900 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|