Sciweavers

10077 search results - page 1910 / 2016
» Mobile Networking in the Internet
Sort
View
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 10 months ago
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects queuing performance in network buffers. A common approach for guaranteein...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 10 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
ICDCS
2007
IEEE
15 years 10 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...
INFOCOM
2007
IEEE
15 years 10 months ago
Small Active Counters
— The need for efficient counter architecture has arisen for the following two reasons. Firstly, a number of data streaming algorithms and network management applications requir...
Rade Stanojevic
INFOCOM
2007
IEEE
15 years 10 months ago
Understanding VoIP from Backbone Measurements
— VoIP has widely been addressed as the technology that will change the Telecommunication model opening the path for convergence. Still today this revolution is far from being co...
Robert Birke, Marco Mellia, Michael Petracca, Dari...
« Prev « First page 1910 / 2016 Last » Next »