enter search term and/or author name
Comparing ingress and egress detection to secure interdomain routing: An experimental analysis
Christoph Goebel, Dirk Neumann, Ramayya Krishnan
Article No.: 5
The global economy and society increasingly depends on computer networks linked together by the Internet. The importance of computer networks reaches far beyond the telecommunications sector since they have become a critical factor for many other...
Distributed application configuration, management, and visualization with plush
Jeannie Albrecht, Christopher Tuttle, Ryan Braud, Darren Dao, Nikolay Topilski, Alex C. Snoeren, Amin Vahdat
Article No.: 6
Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application deployment, monitoring, and maintenance in distributed environments,...
ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services
Ki-Woong Park, Kyu Ho Park
Article No.: 7
Emerging cloud services, including mobile offices, Web-based storage services, and content delivery services, run diverse workloads under various device platforms, networks, and cloud service providers. They have been realized on top of SSL/TLS,...
User-perceived quality assessment of streaming media using reduced feature sets
Amy Csizmar Dalal
Article No.: 8
While subjective measurements are the most natural for assessing the user-perceived quality of a media stream, there are issues with their scalability and their context accuracy. We explore techniques to select application-layer measurements,...