Sciweavers

248 search results - page 35 / 50
» Characterizing a spam traffic
Sort
View
MOBISYS
2006
ACM
15 years 9 months ago
Measurement driven deployment of a two-tier urban mesh access network
Multihop wireless mesh networks can provide Internet access over a wide area with minimal infrastructure expenditure. In this work, we present a measurement driven deployment stra...
Joseph Camp, Joshua Robinson, Christopher Steger, ...
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 3 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ICPP
2006
IEEE
15 years 3 months ago
Achieving Bounded Delay on Message Delivery in Publish/Subscribe Systems
Publish/subscribe (pub/sub) systems are very suitable for the dissemination of dynamic information over the Internet. As dynamic information is usually characterized by a short li...
Jinling Wang, Jiannong Cao, Jing Li, Jie Wu
92
Voted
INFOCOM
1998
IEEE
15 years 1 months ago
Performance Bounds for Dynamic Channel Assignment Schemes Operating under Varying Re-Use Constraints
-We derive bounds for the performance of dynamic channel assignment (DCA) schemeswhich strengthenthe existing Erlang bound. The construction of the bounds is based on a reward para...
Philip A. Whiting, Sem C. Borst
ESAS
2007
Springer
15 years 1 months ago
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
The promise of vehicular communications is to make road traffic safer and more efficient. However, besides the expected benefits, vehicular communications also introduce some priva...
Levente Buttyán, Tamás Holczer, Istv...