Sciweavers

1869 search results - page 261 / 374
» Analysis of Network Processing Workloads
Sort
View
148
Voted
LCN
2008
IEEE
15 years 9 months ago
Understanding and using mobility on Publish/Subscribe based architectures for MANETs
Abstract—Mobile Ad Hoc Networks present several new challenges, mainly due to mobility. Publish/Subscribe is a communication paradigm that fits this network model well since the...
Cristiano G. Rezende, Azzedine Boukerche, Bruno P....
139
Voted
JSAC
2006
165views more  JSAC 2006»
15 years 3 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
JCIT
2010
197views more  JCIT 2010»
14 years 10 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
113
Voted
RAID
2005
Springer
15 years 9 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
139
Voted
NOMS
1998
IEEE
160views Communications» more  NOMS 1998»
15 years 7 months ago
SP-to-SP service ordering specification and its implementation
Network Management Forum (NMF) has defined a set of basic business processes dealing with major TMN service management functions such as performance management, fault management, b...
Graham Chen, Qinzheng Kong, Pierre-Yves Benain