Sciweavers

6 search results - page 1 / 2
» Leveraging BitTorrent for End Host Measurements
Sort
View
PAM
2007
Springer
13 years 11 months ago
Leveraging BitTorrent for End Host Measurements
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
P2P
2010
IEEE
182views Communications» more  P2P 2010»
13 years 2 months ago
Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks
Abstract--As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empir...
Seungbae Kim, Xiaofei Wang, Hyunchul Kim, Taekyoun...
SIGCOMM
2009
ACM
13 years 11 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ICDCS
2008
IEEE
13 years 11 months ago
Relative Network Positioning via CDN Redirections
—Many large-scale distributed systems can benefit from a service that allows them to select among alternative nodes based on their relative network positions. A variety of appro...
Ao-Jan Su, David R. Choffnes, Fabián E. Bus...
SIGCOMM
2010
ACM
13 years 5 months ago
Data center TCP (DCTCP)
Cloud data centers host diverse applications, mixing workloads that require small predictable latency with others requiring large sustained throughput. In this environment, today&...
Mohammad Alizadeh, Albert G. Greenberg, David A. M...