Sciweavers

1316 search results - page 38 / 264
» Comparing mathematical models on the problem of network infe...
Sort
View
ICT
2004
Springer
120views Communications» more  ICT 2004»
15 years 10 months ago
Scalable End-to-End Multicast Tree Fault Isolation
We present a novel protocol, M3L, for multicast tree fault isolation based purely upon end-to-end information. Here, a fault is a link with a loss rate exceeding a specified thres...
Timur Friedman, Donald F. Towsley, James F. Kurose
NETWORK
2011
14 years 11 months ago
Inferring video QoE in real time
Inferring the subjective perception of a video stream in real time continues to be a stiff problem. This article presents MintMOS: a lightweight, no-reference, loadable kernel mod...
Mukundan Venkataraman, Mainak Chatterjee
PODC
2005
ACM
15 years 10 months ago
Maximal independent sets in radio networks
We study the distributed complexity of computing a maximal independent set (MIS) in radio networks with completely unknown topology, asynchronous wake-up, and no collision detecti...
Thomas Moscibroda, Roger Wattenhofer
AAAI
2006
15 years 5 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
NIPS
1998
15 years 5 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp