Sciweavers

295 search results - page 21 / 59
» Differentially-private network trace analysis
Sort
View
CCR
2004
87views more  CCR 2004»
13 years 10 months ago
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Steve Uhlig
NDSS
2008
IEEE
14 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
PE
2007
Springer
100views Optimization» more  PE 2007»
13 years 9 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
GLOBECOM
2010
IEEE
13 years 8 months ago
Optimal Pricing for Mobile Video Streaming Using Behavior Analysis
Mobile phones are among the most popular consumer devices and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plan...
W. Sabrina Lin, K. J. Ray Liu
INFOCOM
2011
IEEE
13 years 1 months ago
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd
—Opportunistic ad-hoc communication enables portable devices such as smartphones to effectively exchange information, taking advantage of their mobility and locality. The nature ...
Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannid...