Sciweavers

981 search results - page 145 / 197
» Semantics-aware trace analysis
Sort
View
SIGCOMM
2009
ACM
15 years 9 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
SIGMETRICS
2009
ACM
140views Hardware» more  SIGMETRICS 2009»
15 years 9 months ago
Maximum likelihood estimation of the flow size distribution tail index from sampled packet data
In the context of network traffic analysis, we address the problem of estimating the tail index of flow (or more generally of any group) size distribution from the observation of...
Patrick Loiseau, Paulo Gonçalves, Sté...
ANSS
2008
IEEE
15 years 9 months ago
A Simulation Study of Common Mobility Models for Opportunistic Networks
Understanding mobility characteristics is important for the design and analysis of routing schemes for mobile ad hoc networks (MANETs). This is especially true for mobile opportun...
Muhammad Abdulla, Robert Simon
ETFA
2008
IEEE
15 years 9 months ago
Real-time enabled debugging for distributed systems
The distribution of real-time tasks in a networked environment in principle has several advantages, above all a high degree of flexibility easing system extension and replacement...
Georg Gaderer, Patrick Loschmidt, Thilo Sauter
ICDCSW
2008
IEEE
15 years 9 months ago
Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach
Research on delay tolerant networks (DTNs) has brought about a plethora of routing algorithms targeted at networks with different mobility patterns. However, few research works ha...
Yifeng Shao, Jie Wu