Sciweavers

5934 search results - page 186 / 1187
» Detecting a Network Failure
Sort
View
PAM
2012
Springer
14 years 5 days ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...
117
Voted
IPPS
2006
IEEE
15 years 10 months ago
Evaluating cooperative checkpointing for supercomputing systems
Cooperative checkpointing, in which the system dynamically skips checkpoints requested by applications at runtime, can exploit system-level information to improve performance and ...
Adam J. Oliner, Ramendra K. Sahoo
152
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Traffic-Aware Inter-Domain Routing for Improved Internet Routing Stability
This paper develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the stability of the BGP-based inter-domain routing system. TIDR is...
Peng Chen, Woon Hyung Cho, Zhenhai Duan, Xin Yuan
SAINT
2003
IEEE
15 years 10 months ago
On Ubiquitous Network Security and Anomaly Detection
As networking trends move toward ubiquitous structuring schemes, the problem of security has taken on an increasingly important role. As a result, we must look to new security par...
Colin Van Dyke, Çetin Kaya Koç
148
Voted
IMC
2010
ACM
15 years 2 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...