Sciweavers

295 search results - page 7 / 59
» Differentially-private network trace analysis
Sort
View
IWCMC
2010
ACM
14 years 2 months ago
Group detection in mobility traces
—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
PAM
2005
Springer
14 years 2 months ago
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
Abstract. While several algorithms have been created to actively measure the end-to-end available bandwidth of a network path, they require instrumentation at both ends of the path...
Marcia Zangrilli, Bruce Lowekamp
DAC
2009
ACM
14 years 10 months ago
Interconnection fabric design for tracing signals in post-silicon validation
Post-silicon validation has become an essential step in the design flow of today's complex integrated circuits. One effective technique that provides real-time visibility to ...
Xiao Liu, Qiang Xu
VIZSEC
2005
Springer
14 years 2 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
SAINT
2005
IEEE
14 years 2 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...