Sciweavers

COMCOM
2006
105views more  COMCOM 2006»
13 years 11 months ago
Dynamic bandwidth reservation for label switched paths: An on-line predictive approach
Managing the bandwidth allocated to a Label Switched Path in MPLS networks plays a major role for provisioning of Quality of Service and efficient use of resources. In doing so, t...
Tricha Anjali, Carlo Bruni, Daniela Iacoviello, Ca...
COMCOM
2006
111views more  COMCOM 2006»
13 years 11 months ago
SCON: Secure management of continuity in sensor networks
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri
COMCOM
2006
151views more  COMCOM 2006»
13 years 11 months ago
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with increasing network usage demands from individual users as well as business communities. Most ...
Myung-Sup Kim, Young J. Won, James W. Hong
COMCOM
2006
103views more  COMCOM 2006»
13 years 11 months ago
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Today's public Wireless LANs are restricted to hotspots. With the current technology, providers can only target a small audience and in turn charge high prices for their serv...
Attila Weyland, Thomas Staub, Torsten Braun
COMCOM
2006
114views more  COMCOM 2006»
13 years 11 months ago
ImTCP: TCP with an inline measurement mechanism for available bandwidth
We introduce a novel mechanism for actively measuring available bandwidth along a network path. Instead of adding probe traffic to the network, the new mechanism exploits data pack...
Cao Le Thanh Man, Go Hasegawa, Masayuki Murata
COMCOM
2006
86views more  COMCOM 2006»
13 years 11 months ago
Study on nominee selection for multicast congestion control
Nominee selection plays a key role in nominee-based congestion control, which is essential for multicast services to ensure fairness and congestion avoidance. Without valid design...
Feng Xie, Gang Feng, Chee Kheong Siew
COMCOM
2006
68views more  COMCOM 2006»
13 years 11 months ago
Estimating the source-destination traffic matrix of a VPN from access-link loads
We address the problem of estimating the source-destination (SD) traffic matrix of a VPN from measurements of aggregated traffic along all access links. We derive two different es...
Shigeo Shioda, Kazuya Ohtani
COMCOM
2006
121views more  COMCOM 2006»
13 years 11 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou