Sciweavers

295 search results - page 23 / 59
» Differentially-private network trace analysis
Sort
View
IMC
2010
ACM
13 years 8 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...
TELETRAFFIC
2007
Springer
14 years 4 months ago
On the Use of Accounting Data for QoS-Aware IP Network Planning
We present an economically efficient framework for provision of essential input for QoS-aware IP network planning. Firstly, we define a process for reuse of network accounting data...
Alan Davy, Dmitri Botvich, Brendan Jennings
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
14 years 2 days ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
CIKM
2007
Springer
14 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
ACSW
2006
13 years 11 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan