Sciweavers

20 search results - page 3 / 4
» Probe Station Placement for Robust Monitoring of Networks
Sort
View
WORM
2004
13 years 7 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
SIGCOMM
2006
ACM
13 years 12 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
LISA
2001
13 years 7 months ago
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers
We describe active measurements of topology and end-to-end latency characteristics between several of the DNS root servers and a subset of their clients using the skitter tool dev...
Marina Fomenkov, Kimberly C. Claffy, Bradley Huffa...
GLOBECOM
2007
IEEE
14 years 10 days ago
Probabilistic-Based Rate Adaptation for IEEE 802.11 WLANs
— Collision awareness has been recognized as a critical component for effective rate adaptation schemes. Recently, several collision-aware rate adaptation schemes have been propo...
Xi Chen, Daji Qiao, Jeonggyun Yu, Sunghyun Choi
CCR
2006
76views more  CCR 2006»
13 years 6 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato