Sciweavers

3250 search results - page 52 / 650
» Quantum behaviors and networks
Sort
View
NETWORKING
2010
13 years 10 months ago
A Longitudinal Study of Small-Time Scaling Behavior of Internet Traffic
We carry out a longitudinal study of evolution of small-time scaling behavior of Internet traffic on the MAWI dataset spanning 8 years. MAWI dataset contains a number of anomalies ...
Himanshu Gupta, Vinay J. Ribeiro, Anirban Mahanti
SIGCOMM
1996
ACM
14 years 1 months ago
Improving the Start-Up Behavior of a Congestion Control Scheme for TCP
Based on experiments conducted in a network simulator and over real networks, this paper proposes changes to the congestion control scheme in current TCP implementations to improv...
Janey C. Hoe
WISA
2004
Springer
14 years 2 months ago
A Probabilistic Method for Detecting Anomalous Program Behavior
In this paper, we, as well as Eskin, Lee, Stolfo [7] propose a method of prediction model. In their method, the program was characterized with both the order and the kind of system...
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
CORR
2011
Springer
174views Education» more  CORR 2011»
13 years 22 days ago
The Degree Sequence of Random Apollonian Networks
We analyze the asymptotic behavior of the degree sequence of Random Apollonian Networks [11]. For previous weaker results see [10, 11].
Charalampos E. Tsourakakis
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 3 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao