Sciweavers

77 search results - page 10 / 16
» Peer-to-Peer Traffic: From Measurements to Analysis
Sort
View
SPW
1999
Springer
15 years 1 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
92
Voted
PEWASUN
2005
ACM
15 years 3 months ago
Characterizing and modeling user mobility in a cellular data network
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...
Emir Halepovic, Carey L. Williamson
CCS
2009
ACM
15 years 10 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
CSDA
2006
103views more  CSDA 2006»
14 years 9 months ago
LASS: a tool for the local analysis of self-similarity
The Hurst parameter H characterizes the degree of long-range dependence (and asymptotic selfsimilarity) in stationary time series. Many methods have been developed for the estimat...
Stilian Stoev, Murad S. Taqqu, Cheolwoo Park, Geor...
COMCOM
2006
134views more  COMCOM 2006»
14 years 9 months ago
On the deployment of VoIP in Ethernet networks: methodology and case study
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step method...
Khaled Salah