Sciweavers

30 search results - page 4 / 6
» Averaging analysis of periodically forced fluid networks
Sort
View
JPDC
2006
253views more  JPDC 2006»
13 years 5 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
ICALP
1993
Springer
13 years 10 months ago
Exact Asymptotics of Divide-and-Conquer Recurrences
The divide-and-conquer principle is a majoi paradigm of algorithms design. Corresponding cost functions satisfy recurrences that directly reflect the decomposition mechanism used i...
Philippe Flajolet, Mordecai J. Golin
TELETRAFFIC
2007
Springer
14 years 1 days ago
On the Interaction Between Internet Applications and TCP
Abstract. We focus in this paper on passive traffic measurement techniques that collect traces of TCP packets and analyze them to derive, for example, round-trip times or aggregate...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
ICCCN
1997
IEEE
13 years 10 months ago
Reliability of Internet Hosts - A Case Study from the End User's Perspective
This paper presents the results of a 40-day reliability study on a set of 97 popular Web sites done from an end user’s perspective. Data for the study was acquired by periodical...
Mahesh Kalyanakrishnan, Ravishankar K. Iyer, Jaqdi...
CCS
2004
ACM
13 years 11 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash