Sciweavers

1215 search results - page 22 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
15 years 11 months ago
What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
Graham Cormode, S. Muthukrishnan, Wei Zhuang
DIMVA
2010
14 years 7 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
CCS
2010
ACM
14 years 9 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
NOSSDAV
2005
Springer
15 years 3 months ago
A traffic model for the Xbox game Halo 2
This paper analyses the traffic characteristics of, and proposes a traffic model for, the Xbox game Halo 2. Our goal is to help players and network providers to estimate the amoun...
Sebastian Zander, Grenville J. Armitage
ICMCS
2005
IEEE
92views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Striping Delay-Sensitive Packets Over Multiple Bursty Wireless Channels
Multi-homed mobile devices have multiple wireless communication interfaces, each connecting to the Internet via a low speed and bursty WAN link such as a cellular link. We propose...
Gene Cheung, Puneet Sharma, Sung-Ju Lee