Sciweavers

Share
PAM
2011
Springer
9 years 1 months ago
Internet Censorship in China: Where Does the Filtering Occur?
China filters Internet traffic in and out of the country. In order to circumvent the firewall, it is helpful to know where the filtering occurs. In this work, we explore the AS-...
Xueyang Xu, Zhuoqing Morley Mao, J. Alex Halderman
PAM
2011
Springer
9 years 1 months ago
Operating a Network Link at 100%
Abstract. Internet speed at the edge is increasing fast with the spread of fiberbased broadband technology. The appearance of bandwidth-consuming applications, such as peer-to-pee...
Changhyun Lee, D. K. Lee, Yung Yi, Sue B. Moon
PAM
2011
Springer
9 years 1 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
PAM
2011
Springer
9 years 1 months ago
Evolution of Cache Replacement Policies to Track Heavy-Hitter Flows
Several important network applications cannot easily scale to higher data rates without requiring focusing just on the large traffic flows. Recent works have discussed algorithmic...
Martin Zádník, Marco Canini
PAM
2011
Springer
9 years 1 months ago
On the Potential of Fixed-Beam 60 GHz Network Interfaces in Mobile Devices
The small form-factor and significantly high bandwidth of 60 GHz wireless network interfaces make them an attractive technology for future bandwidth-hungry mobile devices. To ove...
Kishore Ramachandran, Ravi Kokku, Rajesh Mahindra,...
PAM
2011
Springer
9 years 1 months ago
On the Feasibility of Bandwidth Detouring
Internet applications that route data over default Internet paths can often increase performance by sending their traffic over alternative “detour” paths. Previous work has sho...
Thom Haddow, Sing Wang Ho, Jonathan Ledlie, Cristi...
PAM
2011
Springer
9 years 1 months ago
Peeling Away Timing Error in NetFlow Data
In this paper, we characterize, quantify, and correct timing errors introduced into network flow data by collection and export via Cisco NetFlow version 9. We find that while som...
Brian Trammell, Bernhard Tellenbach, Dominik Schat...
PAM
2011
Springer
9 years 1 months ago
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...
books