Sciweavers

42 search results - page 5 / 9
» Underwater electromagnetic communications using conduction -...
Sort
View
MMB
2004
Springer
149views Communications» more  MMB 2004»
14 years 1 months ago
Relating Query Popularity and File Replication in the Gnutella Peer-to-Peer Network
In this paper, we characterize the user behavior in a peer-to-peer (P2P) file sharing network. Our characterization is based on the results of an extensive passive measurement stu...
Alexander Klemm, Christoph Lindemann, Oliver P. Wa...
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 3 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
SIGCOMM
1996
ACM
14 years 20 days ago
End-to-end Routing Behavior in the Internet
The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exceptions being Chinoy's analysis of the dynamics of Internet routing in...
Vern Paxson
SIGCOMM
1994
ACM
14 years 18 days ago
An Algorithm for Lossless Smoothing of MPEG Video
Interframe compression techniques, such as those used in MPEG video, give rise to a coded bit stream where picture sizes di er by a factor of 10 or more. As a result, bu ering is ...
Simon S. Lam, Simon Chow, David K. Y. Yau
SIGCOMM
2006
ACM
14 years 2 months ago
Enabling contribution awareness in an overlay broadcasting system
We consider the design of bandwidth-demanding broadcasting applications using overlays in environments characterized by hosts with limited and asymmetric bandwidth, and significa...
Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao