Sciweavers

IPOM
2009
Springer
14 years 6 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
IPOM
2009
Springer
14 years 6 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
IPOM
2009
Springer
14 years 6 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
IPOM
2009
Springer
14 years 6 months ago
A Network Optimization Model for Multi-layer IP/MPLS over OTN/DWDM Networks
The operational model for large Internet service providers is moving to a multi-layer architecture consisting of IP/MPLS coupled with OTN/DWDM. While there has been significant wo...
Iyad Katib, Deep Medhi
IPOM
2009
Springer
14 years 6 months ago
Optical Switching Impact on TCP Throughput Limited by TCP Buffers
Giovane C. M. Moura, Tiago Fioreze, Pieter-Tjerk d...
ICN
2009
Springer
14 years 6 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ICN
2009
Springer
14 years 6 months ago
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks
— The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de...
Pavel Mach, Zdenek Becvar, Robert Bestak
ICN
2009
Springer
14 years 6 months ago
jSon: Network of Active Elements with Peer-to-Peer Control Plane
In this paper, we describe and evaluate a scalable network of Active Elements (AE) that implements userempowered virtual-multicast overlay network for synchronous data distributio...
Michal Procházka, Petr Holub, Eva Hladk&aac...
ICN
2009
Springer
14 years 6 months ago
Efficient Virtualization of High-Performance Network Interfaces
Holger Fröning, Heiner Litz, Ulrich Brün...