Sciweavers

IMC
2009
ACM
14 years 4 months ago
Mining communities in networks: a solution for consistency and its evaluation
Haewoon Kwak, Yoonchan Choi, Young-Ho Eom, Hawoong...
IMC
2009
ACM
14 years 6 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
IMC
2009
ACM
14 years 6 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
IMC
2009
ACM
14 years 6 months ago
Quantifying ases multiconnectivity using multicast information
Pascal Mérindol, Virginie Van den Schrieck,...
IMC
2009
ACM
14 years 6 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...
IMC
2009
ACM
14 years 6 months ago
Where's that phone?: geolocating IP addresses on 3G networks
Cell phones connected to high-speed 3G networks constitute an increasingly important class of clients on the Internet. From the viewpoint of the servers they connect to, such devi...
Mahesh Balakrishnan, Iqbal Mohomed, Venugopalan Ra...
IMC
2009
ACM
14 years 6 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
IMC
2009
ACM
14 years 6 months ago
Understanding the efficacy of deployed internet source address validation filtering
Robert Beverly, Arthur Berger, Young Hyun, kc claf...
IMC
2009
ACM
14 years 6 months ago
Inside the bird's nest: measurements of large-scale live VoD from the 2008 olympics
Hao Yin, Xuening Liu, Feng Qiu, Ning Xia, Chuang L...
IMC
2009
ACM
14 years 6 months ago
Triangle inequality variations in the internet
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...