Sciweavers

248 search results - page 24 / 50
» Characterizing a spam traffic
Sort
View
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 3 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
15 years 1 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
70
Voted
MASCOTS
2008
14 years 11 months ago
A Novel and Generic Model for Synthesizing Disk I/O Traffic Based on The Alpha-stable Process
Obtaining representative and concise I/O workloads for the purpose of projecting the performance of storage systems remains a challenge due to the complex nature of I/O behaviors....
Qiang Zou, Dan Feng, Yifeng Zhu, Hong Jiang
INFOCOM
2010
IEEE
14 years 7 months ago
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels
We develop a general approach for designing scheduling policies for real-time traffic over wireless channels. We extend prior work, which characterizes a real-time flow by its traf...
I-Hong Hou, P. R. Kumar
INFOCOM
2010
IEEE
14 years 7 months ago
Tracking Long Duration Flows in Network Traffic
We propose the tracking of long duration flows as a new network measurement primitive. Long-duration flows are characterized by their long lived nature in time, and may not have hi...
Aiyou Chen, Yu Jin, Jin Cao