Sciweavers

CN
2004
89views more  CN 2004»
13 years 11 months ago
On the testability of SDL specifications
The problem of testing from an SDL specification is often complicated by the presence of infeasible paths. This paper introduces an approach for transforming a class of SDL specif...
Robert M. Hierons, T.-H. Kim, Hasan Ural
CN
2004
95views more  CN 2004»
13 years 11 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
CN
2004
111views more  CN 2004»
13 years 11 months ago
Edge-to-edge measurement-based distributed network monitoring
Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and ...
Ahsan Habib, Maleq Khan, Bharat K. Bhargava
CN
2004
81views more  CN 2004»
13 years 11 months ago
A hybrid architecture for cost-effective on-demand media streaming
We propose a new architecture for on-demand media streaming centered around the peer-to-peer (P2P) paradigm. The key idea of the architecture is that peers share some of their res...
Mohamed Hefeeda, Bharat K. Bhargava, David K. Y. Y...
CN
2004
150views more  CN 2004»
13 years 11 months ago
Optimizing interconnection policies
There are two basic types of interconnection agreements between providers in the Internet: peering and transit. A decision every Internet network service provider (INSP) has to ma...
Oliver Heckmann, Jens Schmitt, Ralf Steinmetz
CN
2004
114views more  CN 2004»
13 years 11 months ago
Representing the Internet as a succinct forest
Effective placement of resources used to support distributed services in the Internet depends on an accurate representation of Internet topology and routing. Representations of au...
Jim Gast, Paul Barford
CN
2004
115views more  CN 2004»
13 years 11 months ago
Bandwidth provisioning and pricing for networks with multiple classes of service
Network service providers purchase large point-to-point connections from network owners, then offer individual users network access at a price. Appropriately provisioning (purchas...
Errin W. Fulp, Douglas S. Reeves
CN
2004
84views more  CN 2004»
13 years 11 months ago
A parameter based admission control for differentiated services networks
The Differentiated Services architecture targets at providing scalable network Quality of Service by means of aggregate scheduling. However, the defined framework itself only give...
Markus Fidler, Volker Sander
CN
2004
129views more  CN 2004»
13 years 11 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...