Sciweavers

413 search results - page 65 / 83
» A network service curve approach for the stochastic analysis...
Sort
View
VTC
2006
IEEE
199views Communications» more  VTC 2006»
14 years 22 days ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
TON
2008
106views more  TON 2008»
13 years 6 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
AINA
2007
IEEE
14 years 1 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
ICMCS
2005
IEEE
92views Multimedia» more  ICMCS 2005»
14 years 10 days ago
Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming
In this paper, we propose a hybrid architecture to integrate Peer-to-Peer (P2P) streaming approaches with content distribution networks (CDNs). We further utilize Multiple Descrip...
Yingfei Dong, Ewa Kusmierek, Zhenhai Duan
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 1 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...