Sciweavers

32 search results - page 6 / 7
» Inferring applications at the network layer using collective...
Sort
View
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 4 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami
JSAC
2006
120views more  JSAC 2006»
13 years 5 months ago
Multiple-Source Internet Tomography
Abstract-- Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this ...
Michael Rabbat, Mark Coates, Robert D. Nowak
TON
2008
84views more  TON 2008»
13 years 5 months ago
Trajectory sampling with unreliable reporting
We define and evaluate methods to perform robust network monitoring using trajectory sampling in the presence of report loss. The first challenge is to reconstruct an unambiguous s...
Nick G. Duffield, Matthias Grossglauser
IMC
2010
ACM
13 years 3 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...
KDD
2009
ACM
203views Data Mining» more  KDD 2009»
14 years 6 months ago
Characterizing individual communication patterns
The increasing availability of electronic communication data, such as that arising from e-mail exchange, presents social and information scientists with new possibilities for char...
R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amara...