Sciweavers

ICDCSW
2000
IEEE
13 years 9 months ago
Adaptive Real-Time Monitoring Mechanism for Replicated Distributed Video Player Systems
One of the main problems to ensure the quality of services (QoS) in video playback in a replicated distributed video player system is how to adapt to the changing network traffic ...
Chris C. H. Ngan, Kam-yiu Lam, Edward Chan
GCC
2003
Springer
13 years 9 months ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu
SIGCSE
2003
ACM
151views Education» more  SIGCSE 2003»
13 years 9 months ago
Using Java to teach networking concepts with a programmable network sniffer
A crucial part of the Networking course is the examination of and experimentation with network traffic data. Most standalone network traffic sniffers are quite expensive and those...
Michael J. Jipping, Agata Bugaj, Liliyana Mihalkov...
VECPAR
2004
Springer
13 years 10 months ago
Dynamically Adaptive Binomial Trees for Broadcasting in Heterogeneous Networks of Workstations
Binomial trees have been used extensively for broadcasting in clusters of workstations. In the case of heterogeneous nondedicated clusters and grid environments, the broadcasting o...
Silvia M. Figueira, Christine Mendes
ISNN
2004
Springer
13 years 10 months ago
A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction
Abstract. Internet traffic prediction plays a fundamental role in network design, management, control, and optimization. The self-similar and non-linear nature of network traffic m...
Hanghang Tong, Chongrong Li, Jingrui He
IDEAL
2004
Springer
13 years 10 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
NPC
2005
Springer
13 years 10 months ago
A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNs
One major factor that heavily affects the performance of a content distribution network (CDN) is placement of the surrogates. Previous works take a network-centric approach and con...
Yifeng Chen, Yanxiang He, Jiannong Cao, Jie Wu
ISNN
2005
Springer
13 years 10 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
ISNN
2005
Springer
13 years 10 months ago
Internet Traffic Prediction by W-Boost: Classification and Regression
Abstract. Internet traffic prediction plays a fundamental role in network design, management, control, and optimization. The self-similar and non-linear nature of network traffic m...
Hanghang Tong, Chongrong Li, Jingrui He, Yang Chen
ISMIS
2005
Springer
13 years 10 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni