Sciweavers

202 search results - page 36 / 41
» A Traffic Model for UDP Flows
Sort
View
RAID
2004
Springer
15 years 3 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
PDCN
2004
14 years 11 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
STOC
2002
ACM
111views Algorithms» more  STOC 2002»
15 years 10 months ago
The price of anarchy is independent of the network topology
We study the degradation in network performance caused by the selfish behavior of noncooperative network users. We consider a model of selfish routing in which the latency experie...
Tim Roughgarden
GLOBECOM
2009
IEEE
15 years 1 months ago
Route Capacity Estimation Based Admission Control and QoS Routing for Mesh Networks
Wireless Mesh Networks (WMNs) is a promising key technology for next generation wireless backhauling that is expected to support various types of applications with different qualit...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
COMCOM
2004
142views more  COMCOM 2004»
14 years 9 months ago
An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks
Bluetooth is a new short-range radio technology to form a small wireless system. In most of the current Bluetooth products, the master polls the slaves in a round robin manner and...
Hao Zhu, Guohong Cao, George Kesidis, Chita R. Das