Sciweavers

7544 search results - page 117 / 1509
» Network Forensics Analysis
Sort
View
PEWASUN
2008
ACM
15 years 4 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...
110
Voted
NOMS
2008
IEEE
15 years 9 months ago
A novel approach to bottleneck analysis in networks
—In this paper∗ , we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in...
Nikhil Shetty, Assane Gueye, Jean C. Walrand
ICECCS
2010
IEEE
158views Hardware» more  ICECCS 2010»
15 years 3 months ago
A Network Analysis of Stakeholders in Tool Visioning Process for Story Test Driven Development
Participation from all stakeholders is important in a successful software development project, especially if the development project is complex and has many stakeholders. Identify...
Shelly Park, Frank Maurer
CN
2007
80views more  CN 2007»
15 years 3 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
159
Voted
PE
1998
Springer
158views Optimization» more  PE 1998»
15 years 3 months ago
Asymptotic Approximations and Bottleneck Analysis in Product Form Queueing Networks with Large Populations
Asymptotic approximations are constructed for the performance measures of product form queueing networks consisting of single server, fixed rate nodes with large populations. The...
Charles Knessl, Charles Tier