Sciweavers

7683 search results - page 1362 / 1537
» Distributed Computing with the CLAN Network
Sort
View
IMC
2006
ACM
15 years 10 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
SIGCOMM
2006
ACM
15 years 10 months ago
A measurement study on the impact of routing events on end-to-end internet path performance
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation betw...
Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Ga...
SIGCOMM
2003
ACM
15 years 9 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
NETWORKING
2008
15 years 5 months ago
Designing Optimal iBGP Route-Reflection Topologies
The Border Gateway Protocol (BGP) is used today by all Autonomous Systems (AS) in the Internet. Inside each AS, iBGP sessions distribute the external routes among the routers. In l...
Marc-Olivier Buob, Steve Uhlig, Mickael Meulle
TMC
2010
179views more  TMC 2010»
15 years 2 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
« Prev « First page 1362 / 1537 Last » Next »