Sciweavers

10 search results - page 2 / 2
» An efficient technique to analyze the impact of bursty TCP t...
Sort
View

Publication
220views
15 years 3 months ago
Traffic Management in ATM Networks over Satellite Links
his report presents a survey of the traffic management issues in the design and implementation of satellite-ATM networks. First a reference satellite-ATM network architecture is pr...
R. Goyal, R. Jain, M. Goyal, S. Fahmy, and B. Vand...
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 3 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
CCS
2010
ACM
13 years 5 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
PERVASIVE
2010
Springer
13 years 7 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
TSE
2010
197views more  TSE 2010»
12 years 12 months ago
A Genetic Algorithm-Based Stress Test Requirements Generator Tool and Its Empirical Evaluation
Genetic algorithms (GAs) have been applied previously to UML-driven, stress test requirements generation with the aim of increasing chances of discovering faults relating to networ...
Vahid Garousi