- Rendezvous among experiment entities appear in network experiments both implicitly and explicitly. When the driving system for a network experiment testbed supports such rendezvo...
We report results from the analysis of a 24-hour packet trace containing TCP traffic of approximately 1300 residential ADSL clients. Some of our observations confirm earlier studi...
Matti Siekkinen, Denis Collange, Guillaume Urvoy-K...
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Thorough process improvement starts with an analysis of the current situation. This is also true for requirements engineering processes. The goal of cooperation between DaimlerChq...
Abstract Data mining algorithms have been recently applied to software repositories to help on the maintenance of evolving software systems. In the past, information about what cla...
Lile Hattori, Gilson Pereira dos Santos Jr., Ferna...