Sciweavers

42 search results - page 6 / 9
» Large human communication networks: patterns and a utility-d...
Sort
View
PDPTA
2003
13 years 8 months ago
The Performance of Routing Algorithms under Bursty Traffic Loads
Routing algorithms are traditionally evaluated under Poisson-like traffic distributions. This type of traffic is smooth over large time intervals and has been shown not necessaril...
Jeonghee Shin, Timothy Mark Pinkston
CSE
2009
IEEE
13 years 8 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
INFOCOM
2011
IEEE
12 years 11 months ago
Taming user-generated content in mobile networks via Drop Zones
Abstract—Smartphones have changed the way people communicate. Most prominently, using commonplace mobile device features (e.g., high resolution cameras), they started producing a...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
USS
2004
13 years 8 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 1 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...