Search
Now showing items 1-2 of 2
Modeling, analysis and defense strategies against Internet attacks.
(2005)
Third, we have analyzed the tradeoff between delay caused by filtering of worms at routers, and the delay due to worms' excessive amount of network traffic. We have used the optimal control problem, to determine the ...
Protocols for collaborative applications on overlay networks.
(2006)
Third, we address the limitations of traditional multicasting models. Towards this, we propose a model where a source node has different switching time for each child node and the message arrival time at each child depends ...