Sciweavers

68 search results - page 8 / 14
» sigmetrics 2008
Sort
View
SIGMETRICS
2008
ACM
13 years 10 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Analysis of bittorrent-like protocols for on-demand stored media streaming
This paper develops analytic models that characterize the behavior of on-demand stored media content delivery using BitTorrent-like protocols. The models capture the effects of di...
Nadim Parvez, Carey L. Williamson, Anirban Mahanti...
SIGMETRICS
2008
ACM
13 years 10 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
SIGMETRICS
2008
ACM
109views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Automatic request categorization in internet services
Modeling system performance and workload characteristics has become essential for efficiently provisioning Internet services and for accurately predicting future resource requirem...
Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhur...