Sciweavers

503 search results - page 55 / 101
» IP Queuing Analysis
Sort
View
CEAS
2005
Springer
15 years 5 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
DIMVA
2007
15 years 1 months ago
Measurement and Analysis of Autonomous Spreading Malware in a University Environment
Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
Jan Goebel, Thorsten Holz, Carsten Willems
EUROSYS
2009
ACM
15 years 9 months ago
Predicting replicated database scalability from standalone database profiling
This paper develops analytical models to predict the throughput and the response time of a replicated database using measurements of the workload on a standalone database. These m...
Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecche...
ICC
2009
IEEE
128views Communications» more  ICC 2009»
15 years 6 months ago
Approximate Flow-Aware Networking
—A new variation of the Flow-Aware Networking (FAN) concept is presented in the paper. The proposed solution is based on the Approximate Fair Dropping algorithm and called by us ...
Jerzy Domzal, Andrzej Jajszczyk
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 6 months ago
Network Coding for Two-Way Relaying: Rate Region, Sum Rate and Opportunistic Scheduling
—Network coding for two-way relaying in a three-node network is considered. The achievable rate regions under both traditional four-slot multi-hopping (FSMH) and network coding (...
Chun-Hung Liu, Feng Xue