Sciweavers

43 search results - page 2 / 9
» Tracing the Root of
Sort
View
CCR
2008
166views more  CCR 2008»
15 years 4 months ago
A day at the root of the internet
We analyzed the largest simultaneous collection of full-payload packet traces from a core component of the global Internet infrastructure ever made available to academic researche...
Sebastian Castro, Duane Wessels, Marina Fomenkov, ...
CONEXT
2005
ACM
15 years 6 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
ICCSA
2007
Springer
15 years 10 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
IPPS
2007
IEEE
15 years 10 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
WSC
2008
15 years 6 months ago
Phrase based browsing for simulation traces of network protocols
Most discrete event simulation frameworks are able to output simulation runs as a trace. The Network Simulator 2 (NS2) is a prominent example that does so to decouple generation o...
Nathan J. Schmidt, Peter Kemper