Sciweavers

295 search results - page 50 / 59
» Differentially-private network trace analysis
Sort
View
MOBICOM
1999
ACM
14 years 2 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
LCN
1999
IEEE
14 years 2 months ago
Time Series Models for Internet Data Traffic
A statistical analysis of Internet traffic measurements from a campus site is carried out to examine the influence of the constituent protocols and applications on the characteris...
Chun You, Kavitha Chandra
ICNP
1997
IEEE
14 years 2 months ago
TCP behavior with many flows
TCP's ability to share a bottleneck fairly and efficiently decreases as the number of competing flows increases. This effect starts to appear when there are more flows than p...
Robert Morris
DSN
2008
IEEE
13 years 12 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CCR
2000
121views more  CCR 2000»
13 years 10 months ago
mmdump: a tool for monitoring internet multimedia traffic
Internet multimedia traffic is increasing as applications like streaming media and packet telephony grow in popularity. It is important to monitor the volume and characteristics o...
Jacobus E. van der Merwe, Ramón Cáce...