Results 1 - 10
of
6,280
Modeling and performance analysis of bittorrentlike peer-to-peer networks
- In SIGCOMM
, 2004
"... In this paper, we develop simple models to study the performance of BitTorrent, a second generation peerto-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive mec ..."
Abstract
-
Cited by 574 (3 self)
- Add to MetaCart
mechanism of Bit-Torrent and study its effect on network performance. We also provide numerical results based on both simulations and real traces obtained from the Internet. 1
Methodology for Traffic Load Estimation in WLANs Based on Real Traces
"... Methodology for traffic load estimation in WLANs based on real traces ..."
A Maximum Entropy approach to Natural Language Processing
- COMPUTATIONAL LINGUISTICS
, 1996
"... The concept of maximum entropy can be traced back along multiple threads to Biblical times. Only recently, however, have computers become powerful enough to permit the widescale application of this concept to real world problems in statistical estimation and pattern recognition. In this paper we des ..."
Abstract
-
Cited by 1366 (5 self)
- Add to MetaCart
The concept of maximum entropy can be traced back along multiple threads to Biblical times. Only recently, however, have computers become powerful enough to permit the widescale application of this concept to real world problems in statistical estimation and pattern recognition. In this paper we
An Analysis of Human Mobility using Real Traces
"... Abstract-We present a new analysis for human mobility through real traces captured in a recreational environment. The goal of this analysis is to investigate the motion components, in both a qualitative and quantitative way, and thus, to get a better knowledge of pedestrian mobility behavior. Moreo ..."
Abstract
- Add to MetaCart
Abstract-We present a new analysis for human mobility through real traces captured in a recreational environment. The goal of this analysis is to investigate the motion components, in both a qualitative and quantitative way, and thus, to get a better knowledge of pedestrian mobility behavior
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks
- In Proc. IEEE INFOCOM
, 2006
"... Abstract — Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited dura ..."
Abstract
-
Cited by 488 (12 self)
- Add to MetaCart
evaluations are based on 60 days of traces from a real DTN network we have deployed on 30 buses. Our network, called UMassDieselNet, serves a large geographic area between five colleges. We also evaluate MaxProp on simulated topologies and show it performs well in a wide variety of DTN environments. I.
Hub-Betweenness Analysis in Delay Tolerant Networks Inferred by Real Traces
"... Abstract—In this paper we study the influence of using hub nodes to relay messages in human-based delay tolerant networks (DTNs), by analyzing empirical traces obtained by human mobility monitoring experiments. Four traces known in literature have been considered. We exploit a measure of centrality ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—In this paper we study the influence of using hub nodes to relay messages in human-based delay tolerant networks (DTNs), by analyzing empirical traces obtained by human mobility monitoring experiments. Four traces known in literature have been considered. We exploit a measure of centrality
Social Forwarding in Large Scale Networks: Insights Based on Real Trace Analysis
"... Social forwarding, recently a hot topic in mobile opportunistic networking, faces extreme challenges from potentially large numbers of mobile nodes, vast areas, and limited communication resources. Such conditions render forwarding more challenging in large-scale networks. We observe that forwarding ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
demonstrate, based on real mobility traces, the weakness of existing social forwarding algorithms in large scale communities. We address this weakness by propos-ing strategies for partitioning these large scale communities into sub-communities based on geographic locality or social interests. We also examine
Autograph: Toward automated, distributed worm signature detection
- In Proceedings of the 13th Usenix Security Symposium
, 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract
-
Cited by 362 (3 self)
- Add to MetaCart
by analyzing the prevalence of portions of flow payloads, and thus uses no knowledge of protocol semantics above the TCP level. It is designed to produce signatures that exhibit high sensitivity (high true positives) and high specificity (low false positives); our evaluation of the system on real DMZ traces
Results 1 - 10
of
6,280