Sciweavers

PAM
2015
Springer
9 years 9 months ago
Investigating Transparent Web Proxies in Cellular Networks
Users increasingly use mobile devices as their primary means to access the Internet. While it is well known that cellular network operators employ middleboxes, the details of thei...
Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Ba...
PAM
2015
Springer
9 years 9 months ago
Exploring Miner Evolution in Bitcoin Network
In recent years, Bitcoin, a peer-to-peer network based crypto digital currency, has attracted a lot of attentions from the media, the academia, and the general public. A user in Bi...
Luqin Wang, Yong Liu
PAM
2015
Springer
9 years 9 months ago
Measuring BGP Route Origin Registration and Validation
Abstract. BGP, the de-facto inter-domain routing protocol, was designed without considering security. Recently, network operators have experienced hijacks of their network prefixe...
Daniele Iamartino, Cristel Pelsser, Randy Bush
PAM
2015
Springer
9 years 9 months ago
What You Need to Know About SDN Flow Tables
SDN deployments rely on switches that come from various vendors and differ in terms of performance and available features. Understanding these differences and performance charact...
Maciej Kuzniar, Peter Peresíni, Dejan Kosti...
PAM
2015
Springer
9 years 9 months ago
Characterizing Instant Messaging Apps on Smartphones
Proliferation of smart devices has fueled the popularity of using mobile instant messaging (IM) apps at a rapid pace. While the IM apps on smartphones have become increasingly popu...
Li Zhang, Chao Xu 0009, Parth H. Pathak, Prasant M...
Computer Networks
Top of PageReset Settings