In recent years, Bitcoin, a peer-to-peer network based crypto digital currency, has attracted a lot of attentions from the media, the academia, and the general public. A user in Bi...
Network operators often apply policy-based traffic filtering at the egress of edge networks. These policies can be detected by performing active measurements; however, doing so i...
Matthew Sargent, Jakub Czyz, Mark Allman, Michael ...
Abstract. Particular WLAN pathologies experienced in realistic scenarios are hard to detect, due to the complex nature of the wireless medium. Prior work has employed sophisticated...
Abstract. There is increasing evidence that IPv6 deployment is maturing as a response to the exhaustion of unallocated IPv4 address blocks, leading to gradual convergence of the IP...
Vasileios Giotsas, Matthew J. Luckie, Bradley Huff...
Proliferation of smart devices has fueled the popularity of using mobile instant messaging (IM) apps at a rapid pace. While the IM apps on smartphones have become increasingly popu...
Li Zhang, Chao Xu 0009, Parth H. Pathak, Prasant M...