Sciweavers

382 search results - page 22 / 77
» Tracing Network Attacks to Their Sources
Sort
View
PE
2002
Springer
176views Optimization» more  PE 2002»
13 years 8 months ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
MOBICOM
2010
ACM
13 years 8 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
MMS
2008
13 years 8 months ago
Evalvid-RA: trace driven simulation of rate adaptive MPEG-4 VBR video
Due to the increasing deployment of conversational real-time applications like VoIP and videoconferencing, the Internet is today facing new challenges. Low end-to-end delay is a vi...
Arne Lie, Jirka Klaue
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 2 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
ECSCW
2011
12 years 8 months ago
Digital Traces of Interest: Deriving Interest Relationships from Social Media Interactions
Facebook and Twitter have changed the way we consume information, allowing the people we follow to become our “social filters” and determine the content of our information stre...
Michal Jacovi, Ido Guy, Inbal Ronen, Adam Perer, E...