Sciweavers

286 search results - page 28 / 58
» Network Traffic Sampling Model on Packet Identification
Sort
View
104
Voted
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
16 years 2 days ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...
WICON
2008
15 years 1 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
WSC
2000
15 years 1 months ago
Practical aspects of simulating systems having arrival processes with long-range dependence
Analysis of network traffic indicates that packet arrival processes have significant stochastic dependence. It has been suggested that this dependence is so strong as to be wellmo...
Robert Geist, James Westall
84
Voted
ANOR
2005
102views more  ANOR 2005»
14 years 11 months ago
Locating Active Sensors on Traffic Networks
Sensors are used to monitor traffic in networks. For example, in transportation networks, they may be used to measure traffic volumes on given arcs and paths of the network. This p...
Monica Gentili, Pitu B. Mirchandani
CSE
2011
IEEE
13 years 11 months ago
Performance Enhancement of Network Devices with Multi-Core Processors
— In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many othe...
Nhat-Phuong Tran, Sugwon Hong, Myungho Lee, Seung-...