-
3
-
-
21644443485
-
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
-
Oct
-
K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In Proc. of ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
-
(2003)
Proc. of ACM Symposium on Operating Systems Principles (SOSP)
-
-
Gummadi, K.P.1
Dunn, R.J.2
Saroiu, S.3
Gribble, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
4
-
-
33747653575
-
-
R. B. J. III, E. M. Nahum, D. B. Olshefski, D. Saha, Z.-Y. Shae, and C. Waters. A study of Internet instant messaging and chat protocols. IEEE Network, 20(4):16-21, July-August 2006.
-
R. B. J. III, E. M. Nahum, D. B. Olshefski, D. Saha, Z.-Y. Shae, and C. Waters. A study of Internet instant messaging and chat protocols. IEEE Network, 20(4):16-21, July-August 2006.
-
-
-
-
5
-
-
0038675352
-
The character, functions, and styles of instant messaging in the workplace
-
Nov
-
E. Isaacs, A. Walendowski, S. Whittaker, D. J. Schiano, and C. Kamm. The character, functions, and styles of instant messaging in the workplace. In Proc. of ACM Computer Supported Cooperative Work (CSCW), Nov. 2002.
-
(2002)
Proc. of ACM Computer Supported Cooperative Work (CSCW)
-
-
Isaacs, E.1
Walendowski, A.2
Whittaker, S.3
Schiano, D.J.4
Kamm, C.5
-
7
-
-
43849084995
-
Effective dissemination of presence information in highly partitioned mobile ad hoc networks
-
C. Lindemann and O. P. Waldhorst. Effective dissemination of presence information in highly partitioned mobile ad hoc networks. In Proc. IEEE SECON, 2006.
-
(2006)
Proc. IEEE SECON
-
-
Lindemann, C.1
Waldhorst, O.P.2
-
8
-
-
31844456208
-
On instant messaging worms, analysis and countermeasures
-
Nov
-
M. Mannan and P. C. van Oorschot. On instant messaging worms, analysis and countermeasures. In Proc. of ACM WORM, Nov. 2005.
-
(2005)
Proc. of ACM WORM
-
-
Mannan, M.1
van Oorschot, P.C.2
-
9
-
-
34848915641
-
The structure of an instant messenger network and its vulnerability to malicious codes
-
Aug
-
C. D. Morse and H. Wang. The structure of an instant messenger network and its vulnerability to malicious codes. In Proc. of ACM SIGCOMM, Aug. 2005.
-
(2005)
Proc. of ACM SIGCOMM
-
-
Morse, C.D.1
Wang, H.2
-
12
-
-
34848860968
-
Virus throttling for instant messaging
-
Technical Report HPL-2004-81, HP Laboratories, May
-
M. M. Williamson, A. Parry, and A. Byde. Virus throttling for instant messaging. Technical Report HPL-2004-81, HP Laboratories, May 2004.
-
(2004)
-
-
Williamson, M.M.1
Parry, A.2
Byde, A.3
-
13
-
-
34547479979
-
A study of the short message service of a nationwide cellular network
-
Oct
-
P. Zerfos, X. Meng, and S. H. Wong. A study of the short message service of a nationwide cellular network. In Proc. of ACM SIGCOMMIMC, Oct. 2006.
-
(2006)
Proc. of ACM SIGCOMMIMC
-
-
Zerfos, P.1
Meng, X.2
Wong, S.H.3
|