Sciweavers

476 search results - page 92 / 96
» Analysis of point-to-point packet delay in an operational ne...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
CCS
2004
ACM
14 years 28 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
INFOCOM
2007
IEEE
14 years 1 months ago
Iterative Scheduling Algorithms
— The input-queued switch architecture is widely used in Internet routers due to its ability to run at very high line speeds. A central problem in designing an input-queued switc...
Mohsen Bayati, Balaji Prabhakar, Devavrat Shah, Ma...
WIOPT
2005
IEEE
14 years 1 months ago
A New Hybrid Scheduling Framework for Asymmetric Wireless Environments with Request Repetition
Abstract— The ever-increasing popularity of web services, growing demand for wireless multimedia and introduction of new, feature-enhanced, hand-held devices has already given bi...
Navrati Saxena, Maria Cristina Pinotti, Kalyan Bas...
GLOBECOM
2008
IEEE
13 years 7 months ago
Correlation Among Piecewise Unwanted Traffic Time Series
In this paper, we investigate temporal and spatial correlations of time series of unwanted traffic (i.e., darknet or network telescope traffic) in order to estimate statistical beh...
Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Tosh...