Sciweavers

66 search results - page 10 / 14
» Multi-layer Monitoring of Overlay Networks
Sort
View
120
Voted
GLOBECOM
2009
IEEE
15 years 8 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
109
Voted
WWIC
2004
Springer
138views Communications» more  WWIC 2004»
15 years 7 months ago
Connecting Wireless Sensornets with TCP/IP Networks
Wireless sensor networks are based on the collaborative efforts of many small wireless sensor nodes, which collectively are able to form networks through which sensor information c...
Adam Dunkels, Juan Alonso, Thiemo Voigt, Hartmut R...
85
Voted
DIMVA
2007
15 years 3 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
116
Voted
EUROSYS
2007
ACM
15 years 11 months ago
Latency and bandwidth-minimizing failure detectors
Failure detectors are fundamental building blocks in distributed systems. Multi-node failure detectors, where the detector is tasked with monitoring N other nodes, play a critical...
Kelvin C. W. So, Emin Gün Sirer
IMC
2003
ACM
15 years 7 months ago
On the number of distributed measurement points for network tomography
Internet topology information is only made available in aggregate form by standard routing protocols. Connectivity information and latency characteristicsmust therefore be inferre...
Joseph Douglas Horton, Alejandro López-Orti...