Sciweavers

92 search results - page 15 / 19
» Measuring and Profiling IP Traffic
Sort
View
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 11 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
80
Voted
SIGMETRICS
2008
ACM
126views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Characterizing multiparty voice communication for multiplayer games
Over the last few years, the number of game players using voice communication to talk to each other while playing games has increased dramatically. In fact, many modern games and ...
Gabor Papp, Chris GauthierDickey
USS
2008
15 years 2 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
CCR
2006
116views more  CCR 2006»
14 years 11 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
HOTNETS
2010
14 years 6 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...