Sciweavers

PAM
2009
Springer
14 years 2 days ago
Supporting Enterprise-Grade Audio Conferencing on the Internet
This paper evaluates if the Internet can support enterprise-grade audio conferencing. For our investigation, we collect real-world traffic traces from the audio conferencing solut...
Krishna Ramachandran, Sunitha Beeram
PAM
2009
Springer
14 years 2 days ago
Revisiting Route Caching: The World Should Be Flat
Internet routers’ forwarding tables (FIBs), which must be stored in expensive fast memory for high-speed packet forwarding, are growing quickly in size due to increased multihomi...
Changhoon Kim, Matthew Caesar, Alexandre Gerber, J...
PAM
2009
Springer
14 years 2 days ago
Dynamics of Online Scam Hosting Infrastructure
This paper studies the dynamics of scam hosting infrastructure, with an emphasis on the role of fast-flux service networks. By monitoring changes in DNS records of over 350 distin...
Maria Konte, Nick Feamster, Jaeyeon Jung
PAM
2009
Springer
14 years 2 days ago
Clarified Recorder and Analyzer for Visual Drill Down Network Analysis
This paper presents the Clarified system for passive network . It is based on capturing complete packet history and abstracting it in form of different interactive high-level visua...
Jani Kenttälä, Joachim Viide, Timo Ojala...
PAM
2009
Springer
14 years 2 days ago
Triangle Inequality and Routing Policy Violations in the Internet
Triangle inequality violations (TIVs) are the effect of packets between two nodes being routed on the longer direct path between them when a shorter detour path through an intermed...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
PAM
2009
Springer
14 years 2 days ago
Monitoring the Bittorrent Monitors: A Bird's Eye View
Abstract. Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as ...
Georgos Siganos, Josep M. Pujol, Pablo Rodriguez
PAM
2009
Springer
14 years 2 days ago
Quantifying the Extent of IPv6 Deployment
Our understanding of IPv6 deployment is surprisingly limited. In fact, it is not even clear how we should quantify IPv6 deployment. In this paper, we collect and analyze a variety ...
Elliott Karpilovsky, Alexandre Gerber, Dan Pei, Je...
PAM
2009
Springer
14 years 2 days ago
Access Point Localization Using Local Signal Strength Gradient
Abstract. Many previous studies have examined the placement of access points (APs) to improve the community’s understanding of the deployment and behavioral characteristics of wi...
Dongsu Han, David G. Andersen, Michael Kaminsky, K...
PAM
2009
Springer
14 years 2 days ago
Inferring Spammers in the Network Core
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the m...
Dominik Schatzmann, Martin Burkhart, Thrasyvoulos ...
PAM
2009
Springer
14 years 2 days ago
Multi-layer Monitoring of Overlay Networks
Abstract. Monitoring end-to-end paths in an overlay network is essential for evaluating end-system performance and for troubleshooting anomalous behavior. However, conducting measu...
Mehmet Demirci, Samantha Lo, Srinivasan Seetharama...