Sciweavers

248 search results - page 15 / 50
» Characterizing a spam traffic
Sort
View
WWW
2008
ACM
15 years 10 months ago
A comparative analysis of web and peer-to-peer traffic
Peer-to-Peer (P2P) applications continue to grow in popularity, and have reportedly overtaken Web applications as the single largest contributor to Internet traffic. Using traces ...
Naimul Basher, Aniket Mahanti, Anirban Mahanti, Ca...
APPINF
2003
14 years 11 months ago
A Study on Workload Characterization for a Web Proxy Server
The popularity of the World-Wide-Web has increased dramatically in the past few years. Web proxy servers have an important role in reducing server loads, network traffic, and clie...
George Pallis, Athena Vakali, Lefteris Angelis, Mo...
59
Voted
TEC
2002
89views more  TEC 2002»
14 years 9 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
82
Voted
PODC
2010
ACM
14 years 11 months ago
Brief announcement: capacity of byzantine agreement with finite link capacity - complete characterization of four-node networks
In this paper, we consider the problem of maximizing the throughput of Byzantine agreement, when communication links have finite capacity. Byzantine agreement is a classical probl...
Guanfeng Liang, Nitin Vaidya
100
Voted
PAM
2010
Springer
14 years 11 months ago
A Longitudinal View of HTTP Traffic
Abstract. In this paper we analyze three and a half years of HTTP traffic observed at a small research institute to characterize the evolution of various facets of web operation. W...
Tom Callahan, Mark Allman, Vern Paxson