Sciweavers

964 search results - page 43 / 193
» Performance Limitations of ADSL Users: A Case Study
Sort
View
AIMS
2008
Springer
15 years 1 months ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...
MOBICOM
2010
ACM
15 years 21 hour ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...
ACSAC
1998
IEEE
15 years 4 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 6 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
TWC
2008
130views more  TWC 2008»
14 years 11 months ago
On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu