Sciweavers

785 search results - page 19 / 157
» Cache Behavior of Network Protocols
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
JOIN
2006
113views more  JOIN 2006»
13 years 7 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
MMNS
2000
98views Multimedia» more  MMNS 2000»
13 years 8 months ago
Automating Internet Routing Behavior Analysis Using Public WWW Traceroute Services
: Growing dependence of commerce, industry and academia on the Internet underlines importance of analyzing its behavior. Changing Internet structure makes the gathered data quickly...
Selim Gurun, Boleslaw K. Szymanski
NSDI
2008
13 years 9 months ago
Efficiency Through Eavesdropping: Link-layer Packet Caching
The broadcast nature of wireless networks is the source of both their utility and much of their complexity. To turn what would otherwise be unwanted interference into an advantage...
Mikhail Afanasyev, David G. Andersen, Alex C. Snoe...
22
Voted
NETWORK
2008
94views more  NETWORK 2008»
13 years 7 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo