Sciweavers

382 search results - page 56 / 77
» Performance evaluation of packet capturing systems for high-...
Sort
View
ACSAC
2004
IEEE
14 years 11 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
MOBISYS
2006
ACM
14 years 8 months ago
Feasibility study of mesh networks for all-wireless offices
There is a fair amount of evidence that mesh (static multihop wireless) networks are gaining popularity, both in the academic literature and in the commercial space. Nonetheless, ...
Jakob Eriksson, Sharad Agarwal, Paramvir Bahl, Jit...
INFOCOM
2002
IEEE
14 years 1 months ago
A Congestion Control Algorithm for Tree-based Reliable Multicast Protocols
— This paper contains a detailed description of the congestion control algorithm of TRAM, a tree-based reliable multicast protocol. This algorithm takes advantage of regular ackn...
Dah-Ming Chiu, Miriam Kadansky, Joe Provino, Josep...
CCR
2006
118views more  CCR 2006»
13 years 8 months ago
Tmix: a tool for generating realistic TCP application workloads in ns-2
In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "look...
Michele C. Weigle, Prashanth Adurthi, Félix...
SIGMETRICS
2005
ACM
119views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
Characterizing the two-tier gnutella topology
Characterizing the properties of peer-to-peer (P2P) overlay topologies in file-sharing applications is essential for understanding their impact on the network, identifying their ...
Daniel Stutzbach, Reza Rejaie