Sciweavers

2652 search results - page 489 / 531
» Path Differentials and Applications
Sort
View
SIGCOMM
2004
ACM
15 years 9 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...
SIGMETRICS
2004
ACM
125views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
A hybrid direct-indirect estimator of network internal delays
The network tomography problem requires a remote source to estimate network-internal statistics on individual links within the network. Several techniques have been proposed to pe...
Kostas G. Anagnostakis, Michael Greenwald
EMSOFT
2004
Springer
15 years 9 months ago
Approximation of the worst-case execution time using structural analysis
We present a technique to approximate the worst-case execution time that combines structural analysis with a loop-bounding algorithm based on local induction variable analysis. St...
Matteo Corti, Thomas R. Gross
IWQOS
2004
Springer
15 years 9 months ago
Robust communications for sensor networks in hostile environments
— Clustering sensor nodes increases the scalability and energy efficiency of communications among them. In hostile environments, unexpected failures or attacks on cluster heads ...
Ossama Younis, Sonia Fahmy, Paolo Santi
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
15 years 9 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam