Sciweavers

109 search results - page 9 / 22
» Towards Peer-to-Peer Traffic Analysis Using Flows
Sort
View
APLAS
2005
ACM
14 years 28 days ago
Transformation to Dynamic Single Assignment Using a Simple Data Flow Analysis
This paper presents a novel method to construct a dynamic single assignment (DSA) form of array-intensive, pointer-free C programs (or in any other procedural language). A program ...
Peter Vanbroekhoven, Gerda Janssens, Maurice Bruyn...
SIGMETRICS
2010
ACM
115views Hardware» more  SIGMETRICS 2010»
13 years 2 months ago
The average response time in a heavy-traffic srpt queue
Shortest Remaining Processing Time first (SRPT) has long been known to optimize the queue length distribution and the mean response time (a.k.a. flow time, sojourn time). As such,...
Minghong Lin, Adam Wierman, Bert Zwart
ISQED
2005
IEEE
140views Hardware» more  ISQED 2005»
14 years 28 days ago
Toward Quality EDA Tools and Tool Flows Through High-Performance Computing
As the scale and complexity of VLSI circuits increase, Electronic Design Automation (EDA) tools become much more sophisticated and are held to increasing standards of quality. New...
Aaron N. Ng, Igor L. Markov
ESORICS
2006
Springer
13 years 11 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
ITIIS
2010
172views more  ITIIS 2010»
13 years 5 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li