Sciweavers

Share
IMC
2005
ACM
9 years 1 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft
IMC
2005
ACM
9 years 1 months ago
Facilitating Access Point Selection in IEEE 802.11 Wireless Networks
The performance experienced by wireless clients in IEEE 802.11 wireless networks heavily depends on the clients’ ability to identify the Access Point (AP) that will offer the be...
Sudarshan Vasudevan, Konstantina Papagiannaki, Chr...
IMC
2005
ACM
9 years 1 months ago
Poisson versus Periodic Path Probing (or, Does PASTA Matter?)
Abstract— The well-known PASTA (“Poisson Arrivals See Time Averages”) property states that, under very general conditions, the fraction of Poisson arrivals that observe an un...
Muhammad Mukarram Bin Tariq, Amogh Dhamdhere, Cons...
IMC
2005
ACM
9 years 1 months ago
Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems
During recent years, peer-to-peer (P2P) file-sharing systems have evolved in many ways to accommodate growing numbers of participating peers. In particular, new features have cha...
Daniel Stutzbach, Reza Rejaie, Subhabrata Sen
IMC
2005
ACM
9 years 1 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
IMC
2005
ACM
9 years 1 months ago
A First Look at Modern Enterprise Traffic
Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee...
IMC
2005
ACM
9 years 1 months ago
Estimation of Link Interference in Static Multi-hop Wireless Networks
Jitendra Padhye, Sharad Agarwal, Venkata N. Padman...
IMC
2005
ACM
9 years 1 months ago
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage
Interference has always been considered as an unavoidable peril in wireless networks. A single data transmission is useful to some nodes and becomes interference to others. Based ...
Arunesh Mishra, Eric Rozner, Suman Banerjee, Willi...
IMC
2005
ACM
9 years 1 months ago
Novel Approaches to End-to-End Packet Reordering Measurement
By providing the best-effort service, the Internet Protocol (IP) does not maintain the same order of packets sent out by a host. Therefore, due to the route change, parallelism in...
Xiapu Luo, Rocky K. C. Chang
books