Sciweavers

1447 search results - page 192 / 290
» Simulating Internet Worms
Sort
View
ICDCS
2007
IEEE
15 years 9 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...
ICDM
2007
IEEE
139views Data Mining» more  ICDM 2007»
15 years 9 months ago
Data Clustering with a Relational Push-Pull Model
We present a new generative model for relational data in which relations between objects can have either a binding or a separating effect. For example, in a group of students sep...
Adam Anthony, Marie desJardins
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
108
Voted
ICNP
2007
IEEE
15 years 9 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
ICNP
2007
IEEE
15 years 9 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...