We study the development of mobile peer-to-peer (MP2P) traffic and the usage of MP2P applications in Finland during 2005-2007. Research data consists of 1) traffic traces measured ...
Mikko V. J. Heikkinen, Antero Kivi, Hannu Verkasal...
This paper analyzes the performance of two implementations of J-Flow, the flow measurement tool deployed on most Juniper routers. Our work relies on both controlled experiments an...
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Abstract—This paper proposes a peer-to-peer video streaming delivery system within the framework of Next Generation Networks using Application Level Multicast. Increased efficie...
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
IP address lookup is one of the most important functionalities in the router design. To meet the requirements in high speed routers consisting of linecards with 40Gbps transfer ra...
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate d...