Results 1 - 10
of
2,509
TPRS: An Effective Traffic Pattern Discovery
"... Abstract- Mobile Ad hoc Networks (MANET) is a self configurable and wireless network for mobile devices. They are capable of attracting choices for military operations. Due to the ad hoc behavior it provides fast operation and doesn’t provide any network infrastructure and so the communications are ..."
Abstract
- Add to MetaCart
in anonymous communication. Presently it includes protocols used for mitigating anonymous communication in MANETs. It achieves good accuracy is disclosing the hidden traffic patterns.
Functional discovery via a compendium of expression profiles.
- Cell,
, 2000
"... provided that the cellular transcriptional response to frames encode proteins required for sterol metabodisruption of different steps in the same pathway is lism, cell wall function, mitochondrial respiration, or similar, and that there are sufficiently unique transcripprotein synthesis. We also sh ..."
Abstract
-
Cited by 547 (9 self)
- Add to MetaCart
dyclonine. sion measurement. Using a comprehensive database of reference profiles, the pathway(s) perturbed by an Introduction uncharacterized mutation would be ascertained by simply asking which expression patterns in the database Systematic approaches for identifying the biological its profile most
Capacity of Ad Hoc Wireless Networks
"... Early simulation experience with wireless ad hoc networks suggests that their capacity can be surprisingly low, due to the requirement that nodes forward each others’ packets. The achievable capacity depends on network size, traffic patterns, and detailed local radio interactions. This paper examine ..."
Abstract
-
Cited by 636 (14 self)
- Add to MetaCart
forwarding and the effect on capacity for several simple configurations and traffic patterns. While 802.11 discovers reasonably good schedules, we nonetheless observe capacities markedly less than optimal for very simple chain and lattice networks with very regular traffic patterns. We validate some
Random Early Detection Gateways for Congestion Avoidance.
- IEEELACM Transactions on Networking,
, 1993
"... Abstract-This paper presents Random Early Detection (RED) gateways for congestion avoidance in packet-switched networks. The gateway detects incipient congestion by computing the average queue size. The gateway could notify connections of congestion either by dropping packets arriving at the gatewa ..."
Abstract
-
Cited by 2716 (31 self)
- Add to MetaCart
, the traffic pattern of the connection, the lack of knowledge of the number of congested gateways, the possibilities of routing changes, or other difficulties in distinguishing propagation delay from persistent queueing delay. The most effective detection of congestion can occur in the gateway itself
Autograph: Toward automated, distributed worm signature detection
- In Proceedings of the 13th Usenix Security Symposium
, 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract
-
Cited by 362 (3 self)
- Add to MetaCart
of novel Internet worms. Generation of the worm signatures required by an IDS—the byte patterns sought in monitored traffic to identify worms—today entails non-trivial human labor, and thus significant delay: as network operators detect anomalous behavior, they communicate with one another and manually
Proof of a Fundamental Result in Self-Similar Traffic Modeling
- COMPUTER COMMUNICATION REVIEW
, 1997
"... We state and prove the following key mathematical result in self-similar traffic modeling: the superposition of many ON/OFF sources (also known as packet trains) with strictly alternating ON- and OFF-periods and whose ON-periods or OFF-periods exhibit the Noah Effect (i.e., have high variability or ..."
Abstract
-
Cited by 290 (8 self)
- Add to MetaCart
We state and prove the following key mathematical result in self-similar traffic modeling: the superposition of many ON/OFF sources (also known as packet trains) with strictly alternating ON- and OFF-periods and whose ON-periods or OFF-periods exhibit the Noah Effect (i.e., have high variability
Combinatorial pattern discovery in biological sequences: the TEIRESIAS algorithm
- BIOINFORMATICS
, 1998
"... Motivation: The discovery of motifs in biological sequences is an important problem. Results: This paper presents a new algorithm for the discovery of rigid patterns (motifs) in biological sequences. Our method is combinatorial in nature and able to produce all patterns that appear in at least a (us ..."
Abstract
-
Cited by 231 (14 self)
- Add to MetaCart
the input sequences. The effectiveness of the proposed approach is showcased on a number of test cases which aim to: (i) validate the approach through the discovery of previously reported patterns; (ii) demonstrate the capability to identify automatically highly selective patterns particular
UNIX Disk Access Patterns
, 1993
"... Disk access patterns are becoming ever more important to understand as the gap between processor and disk performance increases. The study presented here is a detailed characterization of every lowlevel disk access generated by three quite different systems over a two month period. The contributions ..."
Abstract
-
Cited by 277 (20 self)
- Add to MetaCart
Disk access patterns are becoming ever more important to understand as the gap between processor and disk performance increases. The study presented here is a detailed characterization of every lowlevel disk access generated by three quite different systems over a two month period
BLINC: Multilevel Traffic Classification in the Dark.
, 2005
"... ABSTRACT We present a fundamentally different approach to classifying traffic flows according to the applications that generate them. In contrast to previous methods, our approach is based on observing and identifying patterns of host behavior at the transport layer. We analyze these patterns at th ..."
Abstract
-
Cited by 228 (7 self)
- Add to MetaCart
ABSTRACT We present a fundamentally different approach to classifying traffic flows according to the applications that generate them. In contrast to previous methods, our approach is based on observing and identifying patterns of host behavior at the transport layer. We analyze these patterns
YouTube Traffic Characterization: A View From the Edge
- PROC. OF IMC
, 2007
"... This paper presents a traffic characterization study of the popular video sharing service, YouTube. Over a three month period we observed almost 25 million transactions between users on an edge network and YouTube, including more than 600,000 video downloads. We also monitored the globally popular v ..."
Abstract
-
Cited by 214 (11 self)
- Add to MetaCart
This paper presents a traffic characterization study of the popular video sharing service, YouTube. Over a three month period we observed almost 25 million transactions between users on an edge network and YouTube, including more than 600,000 video downloads. We also monitored the globally popular
Results 1 - 10
of
2,509