Sciweavers

37 search results - page 4 / 8
» pam 2007
Sort
View
PAM
2007
Springer
14 years 1 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira
PAM
2007
Springer
14 years 1 months ago
A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, w...
Soshant Bali, Sridhar Machiraju, Hui Zang, Victor ...
PAM
2007
Springer
14 years 1 months ago
Leveraging BitTorrent for End Host Measurements
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
PAM
2007
Springer
14 years 1 months ago
Investigating the Imprecision of IP Block-Based Geolocation
The lack of adoption of a DNS-based geographic location service as proposed in RFC 1876 has lead to the deployment of alternative ways to locate Internet hosts. The two main altern...
Bamba Gueye, Steve Uhlig, Serge Fdida
PAM
2007
Springer
14 years 1 months ago
Implications of Power Control in Wireless Networks: A Quantitative Study
Abstract. The use of power control in wireless networks can lead to two conflicting effects. An increase in the transmission power on a link may (i) improve the quality and thus t...
Ioannis Broustis, Jakob Eriksson, Srikanth V. Kris...