Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
Several activities in service oriented computing can benefit from the knowledge of properties of a given service composition ahead of time. We will focus here on properties related...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Workflows often operate in volatile environments in which the component services’ QoS changes frequently. Optimally adapting to these changes becomes an important problem that ...
Girish Chafle, Prashant Doshi, John Harney, Sumit ...