Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, w...
Soshant Bali, Sridhar Machiraju, Hui Zang, Victor ...
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
The lack of adoption of a DNS-based geographic location service as proposed in RFC 1876 has lead to the deployment of alternative ways to locate Internet hosts. The two main altern...
Abstract. The use of power control in wireless networks can lead to two conflicting effects. An increase in the transmission power on a link may (i) improve the quality and thus t...
Ioannis Broustis, Jakob Eriksson, Srikanth V. Kris...