Sciweavers

87 search results - page 12 / 18
» Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of ...
Sort
View
DIMVA
2011
12 years 11 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
ICDCS
2003
IEEE
14 years 20 days ago
Experiences With Monitoring OSPF on a Regional Service Provider Network
This paper presents the results from a detailed, experimental study of OSPF, an intra-domain routing protocol, running on a mid-size regional Internet service provider. Using mult...
David Watson, Farnam Jahanian, Craig Labovitz
CN
2008
108views more  CN 2008»
13 years 7 months ago
Finding a dense-core in Jellyfish graphs
The connectivity of the Internet crucially depends on the relationships between thousands of Autonomous Systems (ASes) that exchange routing information using the Border Gateway P...
Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool
WSDM
2012
ACM
283views Data Mining» more  WSDM 2012»
12 years 2 months ago
The life and death of online groups: predicting group growth and longevity
We pose a fundamental question in understanding how to identify and design successful communities: What factors predict whether a community will grow and survive in the long term?...
Sanjay Ram Kairam, Dan J. Wang, Jure Leskovec
MOBICOM
2000
ACM
13 years 11 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson