Sciweavers

202 search results - page 22 / 41
» Hybrid Packet Fluid Flow Network Simulation
Sort
View
ITIIS
2008
110views more  ITIIS 2008»
15 years 1 months ago
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Sun Ho Kim, Byeong-hee Roh
MONET
2006
97views more  MONET 2006»
15 years 1 months ago
Pre-Reply Probe and Route Request Tail: Approaches for Calculation of Intra-Flow Contention in Multihop Wireless Networks
Several applications have been envisioned for multihop wireless networks that require different qualities of service from the network. In order to support such applications, the n...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
INFOCOM
2009
IEEE
15 years 8 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
MOBICOM
2005
ACM
15 years 7 months ago
GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks
Vehicles equipped with wireless communication devices are poised to deliver vital services in the form of safety alerts, traffic congestion probing and on-road commercial applicat...
Rahul Mangharam, Daniel S. Weller, Daniel D. Stanc...
SIGCOMM
2012
ACM
13 years 4 months ago
DeTail: reducing the flow completion time tail in datacenter networks
Web applications have now become so sophisticated that rendering a typical page may require hundreds of intra-datacenter flows. At the same time, web sites must meet strict page ...
David Zats, Tathagata Das, Prashanth Mohan, Dhruba...