Sciweavers

2821 search results - page 16 / 565
» Tracing a single user
Sort
View
CMS
2006
158views Communications» more  CMS 2006»
13 years 9 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
INFOCOM
1998
IEEE
14 years 5 days ago
TCP Behavior of a Busy Internet Server: Analysis and Improvements
The rapid growth of the World Wide Web in recent years has caused a significant shift in the composition of Internet traffic. Although past work has studied the behavior of TCP dy...
Hari Balakrishnan, Venkata N. Padmanabhan, Sriniva...
EUROPAR
2009
Springer
14 years 17 days ago
Capturing and Visualizing Event Flow Graphs of MPI Applications
A high-level understanding of how an application executes and which performance characteristics it exhibits is essential in many areas of high performance computing, such as applic...
Karl Fürlinger, David Skinner
GLOBECOM
2009
IEEE
14 years 2 months ago
Human Behavior and Challenges of Anonymizing WLAN Traces
—With the wide spread deployment of wireless LANs (WLANs), it is becoming necessary to conduct analysis of libraries of measurements taken from such operational networks. The ava...
Udayan Kumar, Ahmed Helmy
ICMI
2004
Springer
95views Biometrics» more  ICMI 2004»
14 years 1 months ago
EyePrint: support of document browsing with eye gaze trace
Current digital documents provide few traces to help user browsing. This makes document browsing difficult, and we sometimes feel it is hard to keep track of all of the informati...
Takehiko Ohno