Sciweavers

TMA
2010
Springer
137views Management» more  TMA 2010»
13 years 2 months ago
K-Dimensional Trees for Continuous Traffic Classification
Abstract. The network measurement community has proposed multiple machine learning (ML) methods for traffic classification during the last years. Although several research works ha...
Valentín Carela-Español, Pere Barlet...
IMC
2010
ACM
13 years 2 months ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...
CCR
2004
95views more  CCR 2004»
13 years 4 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 4 months ago
Design and Modeling Billing solution to Next Generation Networks
-------------------------------------------------------------------ABSTRACT----------------------------------------------------------------Next generation networks (NGN) services a...
Kamaljit I. Lakhtaria, N. N. Jani
ACSW
2007
13 years 6 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
ICDCS
2010
IEEE
13 years 8 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
CONEXT
2007
ACM
13 years 8 months ago
Rethinking internet traffic management: from multiple decompositions to a practical protocol
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
ICC
2008
IEEE
121views Communications» more  ICC 2008»
13 years 11 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
IFIP
2009
Springer
13 years 11 months ago
Network Awareness in P2P-TV Applications
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...
PAM
2009
Springer
13 years 11 months ago
Analyzing Router Responsiveness to Active Measurement Probes
Abstract. Active probing has increasingly been used to collect information about the topological and functional characteristics of the Internet. Given the need for active probing a...
Mehmet Hadi Gunes, Kamil Saraç