Sciweavers

1102 search results - page 30 / 221
» Interference and Communications among Active Network Applica...
Sort
View
NDSS
2009
IEEE
15 years 7 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson
85
Voted
CONEXT
2007
ACM
15 years 4 months ago
Can active tracking of inroamer location optimise a live GSM network?
The mobile communication industry has experienced huge growth in recent years, which amplified the competition among telecommunication companies. This inspired the search for new ...
Katerina Dufková, Jirí Danihelka, Mi...
SAC
2002
ACM
15 years 2 days ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 7 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...
75
Voted
KDD
2009
ACM
150views Data Mining» more  KDD 2009»
16 years 29 days ago
Large human communication networks: patterns and a utility-driven generator
Given a real, and weighted person-to-person network which changes over time, what can we say about the cliques that it contains? Do the incidents of communication, or weights on t...
Nan Du, Christos Faloutsos, Bai Wang, Leman Akoglu