—The Session Initiation Protocol (SIP) is widely used for VoIP communication. Losses caused by network or server overload would cause retransmissions and delays in the session es...
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
—The effect of antenna mutual coupling on fading correlation in compact MIMO arrays has received considerable attention. By contrast, relatively little attention has been paid to...
Carlo P. Domizioli, Brian L. Hughes, Kevin G. Gard...
—Despite the importance of traffic classification in modern networks, the number of languages tailored to this task is extremely limited. These languages can be valuable, because...
— Bandwidth constraint models have been a topic of intense discussions at the IETF meetings. Three conventional methods have been described in informational IETF RFCs and their p...
Joshua B. Goldberg, Sukrit Dasgupta, Jaudelice Cav...