Sciweavers

E2EMON
2006
IEEE
14 years 5 months ago
Implementation and Evaluation of a Protocol for Detecting Network-Wide Threshold Crossing Alerts
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
Fetahi Wuhib, Rolf Stadler, Alexander Clemm
E2EMON
2006
IEEE
14 years 5 months ago
How to Identify the Speed Limiting Factor of a TCP Flow
Mark Timmer, Pieter-Tjerk de Boer, Aiko Pras
E2EMON
2006
IEEE
14 years 5 months ago
An Analysis of Active End-to-end Bandwidth Measurements in Wireless Networks
— For active, probing-based bandwidth measurements performed on top of the unifying IP layer, it may seem reasonable to expect the measurement problem in wireless networks to be ...
Andreas Johnsson, Mats Björkman, Bob Melander
DSN
2006
IEEE
14 years 5 months ago
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults
The Solaris 10 Operating System includes a number of new features for predictive self-healing. One such feature is the ability of the Fault Management software to diagnose memory ...
Dong Tang, Peter Carruthers, Zuheir Totari, Michae...
DSN
2006
IEEE
14 years 5 months ago
Improving the Fault Resilience of Overlay Multicast for Media Streaming
This paper addresses the problem of fault resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast tree that minimizes the negati...
Guang Tan, Stephen A. Jarvis, Daniel P. Spooner
DSN
2006
IEEE
14 years 5 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
DSN
2006
IEEE
14 years 5 months ago
Evaluating the Performability of Systems with Background Jobs
As most computer systems are expected to remain operational 24 hours a day, 7 days a week, they must complete maintenance work while in operation. This work is in addition to the ...
Qi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska,...
DSN
2006
IEEE
14 years 5 months ago
The Startup Problem in Fault-Tolerant Time-Triggered Communication
Fault-tolerant time-triggered communication relies on the synchronization of local clocks. The startup problem is the problem of reaching a sufficient degree of synchronization a...
Wilfried Steiner, Hermann Kopetz
DSN
2006
IEEE
14 years 5 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
DSN
2006
IEEE
14 years 5 months ago
A large-scale study of failures in high-performance computing systems
Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations is publicly avai...
Bianca Schroeder, Garth A. Gibson