Sciweavers

248 search results - page 44 / 50
» Characterizing a spam traffic
Sort
View
SP
2008
IEEE
14 years 9 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
TON
2008
84views more  TON 2008»
14 years 9 months ago
Trajectory sampling with unreliable reporting
We define and evaluate methods to perform robust network monitoring using trajectory sampling in the presence of report loss. The first challenge is to reconstruct an unambiguous s...
Nick G. Duffield, Matthias Grossglauser
TON
2008
100views more  TON 2008»
14 years 9 months ago
Impact of hot-potato routing changes in IP networks
Abstract-- Despite the architectural separation between intradomain and interdomain routing in the Internet, intradomain protocols do influence the path-selection process in the Bo...
Renata Teixeira, Aman Shaikh, Timothy G. Griffin, ...
COMCOM
2004
118views more  COMCOM 2004»
14 years 9 months ago
The next frontier for communications networks: power management
Storage, memory, processor, and communications bandwidth are all relatively plentiful and inexpensive. However, a growing expense in the operation of computer networks is electric...
Kenneth J. Christensen, Chamara Gunaratne, Bruce N...
MONET
2007
126views more  MONET 2007»
14 years 9 months ago
Performance Evaluation of a Power Management Scheme for Disruption Tolerant Network
Disruption Tolerant Network (DTN) is characterized by frequent partitions and intermittent connectivity. Power management issue in such networks is challenging. Existing power man...
Yong Xi, Mooi Choo Chuah, K. Chang