Abstract— This paper provides a discussion on how teleoperated robots could be utilized to do the simple triage of victims of a multiple casualty incident. Previous work in the a...
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
— This paper presents a new end-to-end available bandwidth measurement tool called IGMPS (Improved Gap Model using Packet Size parameter). IGMPS is a lightweight tool based on a ...
—This paper presents an Erlang reduced load model to analyze Optical Burst Switched Grid networks. The model allows the evaluation of job blocking probabilities, in which blockin...
Marc De Leenheer, Chris Develder, Filip De Turck, ...
— Short flow first scheduling (SFF) strategy is effective in obtaining more stringent performance bounds for short flows in Internet. However, previous strict SFF approaches i...
Abstract—This paper presents a novel architecture for Gridenabled optical burst switched networks. We suggest an overall Grid network architecture and we propose a Grid Optical U...
—The IT domain has considerably evolved, users are now surrounded with cheaper and more powerful terminals than ever. Mobile and fixed devices connected to high-speed network tec...
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Network flow buffering is the use of a simple remote flowregulating buffer that is dynamically deployed between a Web client and server to improve the performance of HTTP-based ac...