[PDF][PDF] A taxonomy and survey of content delivery networks
AMK Pathan, R Buyya - Grid computing and distributed systems …, 2007 - hit.bme.hu
Content Delivery Networks (CDNs) have evolved to overcome the inherent limitations of the
Internet in terms of user perceived Quality of Service (QoS) when accessing Web content. A …
Internet in terms of user perceived Quality of Service (QoS) when accessing Web content. A …
A taxonomy of data grids for distributed data sharing, management, and processing
Data Grids have been adopted as the next generation platform by many scientific
communities that need to share, access, transport, process, and manage large data …
communities that need to share, access, transport, process, and manage large data …
Understanding the impact of video quality on user engagement
As the distribution of the video over the Internet becomes main-stream and its consumption
moves from the computer to the TV screen, user expectation for high quality is constantly …
moves from the computer to the TV screen, user expectation for high quality is constantly …
Routing in a delay tolerant network
S Jain, K Fall, R Patra - Proceedings of the 2004 conference on …, 2004 - dl.acm.org
We formulate the delay-tolerant networking routing problem, where messages are to be
moved end-to-end across a connectivity graph that is time-varying but whose dynamics may …
moved end-to-end across a connectivity graph that is time-varying but whose dynamics may …
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker… - ACM Transactions on …, 2006 - dl.acm.org
In this article, we seek to address a simple question:“How prevalent are denial-of-service
attacks in the Internet?” Our motivation is to quantitatively understand the nature of the …
attacks in the Internet?” Our motivation is to quantitatively understand the nature of the …
Accurate, scalable in-network identification of p2p traffic using application signatures
S Sen, O Spatscheck, D Wang - … of the 13th international conference on …, 2004 - dl.acm.org
The ability to accurately identify the network traffic associated with different P2P applications
is important to a broad range of network operations including application-specific traffic …
is important to a broad range of network operations including application-specific traffic …
You are how you touch: User verification on smartphones via tap** behaviors
Smartphone users have their own unique behavioral patterns when tap** on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
Splitstream: High-bandwidth multicast in cooperative environments
In tree-based multicast systems, a relatively small number of interior nodes carry the load of
forwarding multicast messages. This works well when the interior nodes are highly …
forwarding multicast messages. This works well when the interior nodes are highly …
Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing
R Zhou, K Hwang - IEEE Transactions on parallel and …, 2007 - ieeexplore.ieee.org
Peer-to-Peer (P2P) reputation systems are essential to evaluate the trustworthiness of
participating peers and to combat the selfish, dishonest, and malicious peer behaviors. The …
participating peers and to combat the selfish, dishonest, and malicious peer behaviors. The …
Making gnutella-like p2p systems scalable
Y Chawathe, S Ratnasamy, L Breslau… - Proceedings of the …, 2003 - dl.acm.org
Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized
file search facility. Subsequent P2P systems like Gnutella adopted decentralized search …
file search facility. Subsequent P2P systems like Gnutella adopted decentralized search …