Sciweavers

4962 search results - page 95 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
144
Voted
ISMIS
2005
Springer
15 years 10 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 11 months ago
Multi-Device Seamless Service by User-Oriented Session in All-IP Network
—Evolutionary development towards all-IP networks will have various kinds of devices connected to the Internet. In such the ubiquitous networking environment with the features of...
Naoki Imai, Manabu Isomura, Hiroki Horiuchi
AINA
2008
IEEE
15 years 11 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
STOC
2003
ACM
137views Algorithms» more  STOC 2003»
16 years 5 months ago
Near-optimal network design with selfish agents
We introduce a simple network design game that models how independent selfish agents can build or maintain a large network. In our game every agent has a specific connectivity requ...
Elliot Anshelevich, Anirban Dasgupta, Éva T...
CORR
2011
Springer
243views Education» more  CORR 2011»
15 years 11 hour ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...