Sciweavers

1447 search results - page 192 / 290
» Simulating Internet Worms
Sort
View
ICDCS
2007
IEEE
15 years 8 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...
ICDM
2007
IEEE
139views Data Mining» more  ICDM 2007»
15 years 8 months ago
Data Clustering with a Relational Push-Pull Model
We present a new generative model for relational data in which relations between objects can have either a binding or a separating effect. For example, in a group of students sep...
Adam Anthony, Marie desJardins
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
ICNP
2007
IEEE
15 years 8 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
135
Voted
ICNP
2007
IEEE
15 years 8 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...