Sciweavers

ICDCSW
2000
IEEE
13 years 12 months ago
Adaptive Real-Time Monitoring Mechanism for Replicated Distributed Video Player Systems
One of the main problems to ensure the quality of services (QoS) in video playback in a replicated distributed video player system is how to adapt to the changing network traffic ...
Chris C. H. Ngan, Kam-yiu Lam, Edward Chan
GCC
2003
Springer
14 years 19 days ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu
SIGCSE
2003
ACM
151views Education» more  SIGCSE 2003»
14 years 20 days ago
Using Java to teach networking concepts with a programmable network sniffer
A crucial part of the Networking course is the examination of and experimentation with network traffic data. Most standalone network traffic sniffers are quite expensive and those...
Michael J. Jipping, Agata Bugaj, Liliyana Mihalkov...
VECPAR
2004
Springer
14 years 23 days ago
Dynamically Adaptive Binomial Trees for Broadcasting in Heterogeneous Networks of Workstations
Binomial trees have been used extensively for broadcasting in clusters of workstations. In the case of heterogeneous nondedicated clusters and grid environments, the broadcasting o...
Silvia M. Figueira, Christine Mendes
ISNN
2004
Springer
14 years 24 days ago
A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction
Abstract. Internet traffic prediction plays a fundamental role in network design, management, control, and optimization. The self-similar and non-linear nature of network traffic m...
Hanghang Tong, Chongrong Li, Jingrui He
IDEAL
2004
Springer
14 years 24 days ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
NPC
2005
Springer
14 years 28 days ago
A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNs
One major factor that heavily affects the performance of a content distribution network (CDN) is placement of the surrogates. Previous works take a network-centric approach and con...
Yifeng Chen, Yanxiang He, Jiannong Cao, Jie Wu
ISNN
2005
Springer
14 years 28 days ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
ISNN
2005
Springer
14 years 28 days ago
Internet Traffic Prediction by W-Boost: Classification and Regression
Abstract. Internet traffic prediction plays a fundamental role in network design, management, control, and optimization. The self-similar and non-linear nature of network traffic m...
Hanghang Tong, Chongrong Li, Jingrui He, Yang Chen
ISMIS
2005
Springer
14 years 28 days ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni