Sciweavers

459 search results - page 71 / 92
» Detecting Spam at the Network Level
Sort
View
USENIX
2007
15 years 6 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
145
Voted
TRIDENTCOM
2010
IEEE
15 years 1 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
149
Voted
EUC
2005
Springer
15 years 9 months ago
Ubiquitous Computing: Challenges in Flexible Data Aggregation
Abstract. A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implie...
Eiko Yoneki, Jean Bacon
126
Voted
IPPS
2000
IEEE
15 years 8 months ago
ACDS: Adapting Computational Data Streams for High Performance
Data-intensive, interactive applications are an important class of metacomputing (Grid) applications. They are characterized by large, time-varying data flows between data provid...
Carsten Isert, Karsten Schwan
146
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng