Sciweavers

12536 search results - page 145 / 2508
» Cardinality Networks and Their Applications
Sort
View
138
Voted
JMLR
2006
113views more  JMLR 2006»
15 years 4 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
174
Voted

Publication
232views
15 years 2 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
SPAA
2004
ACM
15 years 9 months ago
On achieving optimized capacity utilization in application overlay networks with multiple competing sessions
In this paper, we examine the problem of large-volume data dissemination via overlay networks. A natural way to maximize the throughput of an overlay multicast session is to split...
Yi Cui, Baochun Li, Klara Nahrstedt
138
Voted
CCR
2006
76views more  CCR 2006»
15 years 4 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
128
Voted
IPCCC
2005
IEEE
15 years 9 months ago
On transport daemons for small collaborative applications over wide-area networks
A number of science applications employing collaborative computations require transport methods that guarantee end-to-end performance at the application level. Throughputs achieve...
Qishi Wu, Nageswara S. V. Rao, S. Sitharama Iyenga...