Sciweavers

295 search results - page 49 / 59
» Differentially-private network trace analysis
Sort
View
FORTE
2007
13 years 11 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
GECON
2008
Springer
152views Business» more  GECON 2008»
13 years 11 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
COMCOM
2004
84views more  COMCOM 2004»
13 years 10 months ago
A self-extracting accurate modeling for bounded-delay video services
This article proposes the XGOP-B deterministic traffic model for MPEG video services requiring strict bounds on the quality of service provided by the network. The XGOP-B model ta...
Marcelo Dias de Amorim, Otto Carlos Muniz Bandeira...
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
14 years 4 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
IMC
2005
ACM
14 years 3 months ago
Predicting Short-Transfer Latency from TCP Arcana: A Trace-based Validation
In some contexts it may be useful to predict the latency for short TCP transfers. For example, a Web server could automatically tailor its content depending on the network path to...
Martin F. Arlitt, Balachander Krishnamurthy, Jeffr...