Sciweavers

248 search results - page 22 / 50
» Characterizing a spam traffic
Sort
View
89
Voted
INFOCOM
1997
IEEE
15 years 1 months ago
Time Scale Analysis of an ATM Queueing System with Long-Range Dependent Traffic
Several types of network trafic have been shown to exhibit long-range dependence (LRD). In this work, we show that the busy period of an ATM system driven by a long-range dependen...
Gilberto Mayor, John A. Silvester
91
Voted
IOR
2008
82views more  IOR 2008»
14 years 9 months ago
Heavy-Traffic Optimality of a Stochastic Network Under Utility-Maximizing Resource Allocation
We study a stochastic network that consists of a set of servers processing multiple classes of jobs. Each class of jobs requires a concurrent occupancy of several servers while be...
Heng-Qing Ye, David D. Yao
PE
2008
Springer
114views Optimization» more  PE 2008»
14 years 9 months ago
Buffer overflow asymptotics for multiplexed regulated traffic
By characterizing the worst case profile, which maximizes the content of a buffer fed with leaky bucket regulated flows in packet telecommunication networks, we derive a tight upp...
Yu Ying, Fabrice Guillemin, Ravi Mazumdar, Catheri...
81
Voted
ICDCS
2007
IEEE
15 years 1 months ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
WWW
2011
ACM
14 years 4 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco