Sciweavers

155 search results - page 17 / 31
» Detecting the performance impact of upgrades in large operat...
Sort
View
USENIX
2007
13 years 10 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
CASES
2003
ACM
14 years 25 days ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
AP2PS
2009
IEEE
14 years 2 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
WIOPT
2011
IEEE
12 years 11 months ago
A framework for femtocells to access both licensed and unlicensed bands
—Cellular operators have been offloading data traffic from their licensed bands to unlicensed bands through a large number of WiFi hotspots over the past years. Although this a...
Feilu Liu, Erdem Bala, Elza Erkip, Rui Yang
PAM
2010
Springer
14 years 2 months ago
Measuring and Evaluating TCP Splitting for Cloud Services
In this paper, we examine the benefits of split-TCP proxies, deployed in an operational world-wide network, for accelerating cloud services. We consider a fraction of a network co...
Abhinav Pathak, Angela Wang, Cheng Huang, Albert G...