Sciweavers

1639 search results - page 218 / 328
» Degree-constrained network flows
Sort
View
88
Voted
PST
2008
15 years 2 months ago
Investigating Two Different Approaches for Encrypted Traffic Classification
The basic objective of this work is to compare the utility of an expert driven system and a data driven system for classifying encrypted network traffic, specifically SSH traffic ...
Riyad Alshammari, A. Nur Zincir-Heywood
94
Voted
SIGOPS
2008
162views more  SIGOPS 2008»
15 years 20 days ago
CUBIC: a new TCP-friendly high-speed TCP variant
CUBIC is a congestion control protocol for TCP (transmission control protocol) and the current default TCP algorithm in Linux. The protocol modifies the linear window growth funct...
Sangtae Ha, Injong Rhee, Lisong Xu
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
15 years 7 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash
CLUSTER
2005
IEEE
15 years 6 months ago
Efficient and Robust Computation of Resource Clusters in the Internet
Applications such as parallel computing, online games, and content distribution networks need to run on a set of resources with particular network connection characteristics to ge...
Chuang Liu, Ian T. Foster
EMSOFT
2010
Springer
14 years 10 months ago
Semantics-preserving implementation of synchronous specifications over dynamic TDMA distributed architectures
We propose a technique to automatically synthesize programs and schedules for hard real-time distributed (embedded) systems from synchronous data-flow models. Our technique connec...
Dumitru Potop-Butucaru, Akramul Azim, Sebastian Fi...