Sciweavers

CCR
2006
76views more  CCR 2006»
13 years 11 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
CCR
2006
116views more  CCR 2006»
13 years 11 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
CCR
2006
118views more  CCR 2006»
13 years 11 months ago
Tmix: a tool for generating realistic TCP application workloads in ns-2
In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "look...
Michele C. Weigle, Prashanth Adurthi, Félix...
CCR
2006
73views more  CCR 2006»
13 years 11 months ago
Conference report: LANC05
Dave Oran
CCR
2006
110views more  CCR 2006»
13 years 11 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
CCR
2006
76views more  CCR 2006»
13 years 11 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
CCR
2006
108views more  CCR 2006»
13 years 11 months ago
Counting 6to4 relay routers
6to4 is a mechanism for providing IPv6 addresses and connectivity where native IPv6 is not available. In 6to4, the links between the IPv4 and IPv6 Internets are called relay route...
David Malone
CCR
2006
82views more  CCR 2006»
13 years 11 months ago
The internet AS-level topology: three data sources and one definitive metric
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP,...
Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenk...
CCR
2006
117views more  CCR 2006»
13 years 11 months ago
Efficient and decentralized computation of approximate global state
Abstract-- The need for efficient computation of approximate global state lies at the heart of a wide range of problems in distributed systems. Examples include routing in the Inte...
S. Keshav
CCR
2006
103views more  CCR 2006»
13 years 11 months ago
A distributed traffic control scheme based on edge-centric resource management
The correct admission of flows in the Differentiated Services (DiffServ) environment is critical to provide stable and predictable quality of service (QoS) to the end user. Withou...
Yingxin Jiang, Aaron Striegel