Sciweavers

416 search results - page 72 / 84
» Modular network trace analysis
Sort
View
DSN
2008
IEEE
13 years 12 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CCR
2000
121views more  CCR 2000»
13 years 10 months ago
mmdump: a tool for monitoring internet multimedia traffic
Internet multimedia traffic is increasing as applications like streaming media and packet telephony grow in popularity. It is important to monitor the volume and characteristics o...
Jacobus E. van der Merwe, Ramón Cáce...
ICASSP
2011
IEEE
13 years 1 months ago
Pricing game and evolution dynamics for mobile video streaming
The recent developments of smart mobile phones and 3G networks enable users to enjoy video programs by subscribing to data plans. Due to phone-to-phone communication technologies ...
Wan-Yi Sabrina Lin, K. J. Ray Liu
SIGCOMM
2006
ACM
14 years 4 months ago
Quantifying Skype user satisfaction
The success of Skype has inspired a generation of peer-topeer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, suc...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
WWW
2004
ACM
14 years 11 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang