Sciweavers

43 search results - page 2 / 9
» Tracing the Root of
Sort
View
CCR
2008
166views more  CCR 2008»
13 years 5 months ago
A day at the root of the internet
We analyzed the largest simultaneous collection of full-payload packet traces from a core component of the global Internet infrastructure ever made available to academic researche...
Sebastian Castro, Duane Wessels, Marina Fomenkov, ...
CONEXT
2005
ACM
13 years 7 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
ICCSA
2007
Springer
13 years 12 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
IPPS
2007
IEEE
14 years 1 days ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
WSC
2008
13 years 8 months ago
Phrase based browsing for simulation traces of network protocols
Most discrete event simulation frameworks are able to output simulation runs as a trace. The Network Simulator 2 (NS2) is a prominent example that does so to decouple generation o...
Nathan J. Schmidt, Peter Kemper