Sciweavers

189 search results - page 17 / 38
» On the success of network inference using a markov routing m...
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
A stochastic analysis of greedy routing in a spatially-dependent sensor network
For a sensor network, as tractable spatially-dependent node deployment model is presented with the property that the density is inversely proportional to the sink distance. A stoc...
H. Paul Keeler
USS
2010
13 years 5 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
JSAC
2007
87views more  JSAC 2007»
13 years 7 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
IMC
2003
ACM
14 years 27 days ago
Simple network performance tomography
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
Nick G. Duffield
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
12 years 11 months ago
Discovering popular routes from trajectories
—The booming industry of location-based services has accumulated a huge collection of users’ location trajectories of driving, cycling, hiking, etc. In this work, we investigat...
Zaiben Chen, Heng Tao Shen, Xiaofang Zhou