• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,280
Next 10 →

Modeling and performance analysis of bittorrentlike peer-to-peer networks

by Dongyu Qiu, R. Srikant - In SIGCOMM , 2004
"... In this paper, we develop simple models to study the performance of BitTorrent, a second generation peerto-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive mec ..."
Abstract - Cited by 574 (3 self) - Add to MetaCart
mechanism of Bit-Torrent and study its effect on network performance. We also provide numerical results based on both simulations and real traces obtained from the Internet. 1

On infinite real trace rational languages of . . .

by Olivier Finkel, Jean-Pierre Ressayre, Pierre Simonnet , 2008
"... ..."
Abstract - Add to MetaCart
Abstract not found

Methodology for Traffic Load Estimation in WLANs Based on Real Traces

by Andrey Krendzel, See Profile, Portoles-comeras Marc, Josep Mangues-bafalluy, See Profile, Andrey Krendzel, Marc Portoles-comeras, Josep Mangues-bafalluy
"... Methodology for traffic load estimation in WLANs based on real traces ..."
Abstract - Add to MetaCart
Methodology for traffic load estimation in WLANs based on real traces

A Maximum Entropy approach to Natural Language Processing

by Adam L. Berger, Stephen A. Della Pietra , Vincent J. Della Pietra - COMPUTATIONAL LINGUISTICS , 1996
"... The concept of maximum entropy can be traced back along multiple threads to Biblical times. Only recently, however, have computers become powerful enough to permit the widescale application of this concept to real world problems in statistical estimation and pattern recognition. In this paper we des ..."
Abstract - Cited by 1366 (5 self) - Add to MetaCart
The concept of maximum entropy can be traced back along multiple threads to Biblical times. Only recently, however, have computers become powerful enough to permit the widescale application of this concept to real world problems in statistical estimation and pattern recognition. In this paper we

An Analysis of Human Mobility using Real Traces

by Tiago S Azevedo , Rafael L Bezerra , Carlos A V Campos , Luís F M De Moraes
"... Abstract-We present a new analysis for human mobility through real traces captured in a recreational environment. The goal of this analysis is to investigate the motion components, in both a qualitative and quantitative way, and thus, to get a better knowledge of pedestrian mobility behavior. Moreo ..."
Abstract - Add to MetaCart
Abstract-We present a new analysis for human mobility through real traces captured in a recreational environment. The goal of this analysis is to investigate the motion components, in both a qualitative and quantitative way, and thus, to get a better knowledge of pedestrian mobility behavior

MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks

by John Burgess, Brian Gallagher, David Jensen, Brian Neil Levine - In Proc. IEEE INFOCOM , 2006
"... Abstract — Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited dura ..."
Abstract - Cited by 488 (12 self) - Add to MetaCart
evaluations are based on 60 days of traces from a real DTN network we have deployed on 30 buses. Our network, called UMassDieselNet, serves a large geographic area between five colleges. We also evaluate MaxProp on simulated topologies and show it performs well in a wide variety of DTN environments. I.

Hub-Betweenness Analysis in Delay Tolerant Networks Inferred by Real Traces

by Giuliano Grossi, Federico Pedersini
"... Abstract—In this paper we study the influence of using hub nodes to relay messages in human-based delay tolerant networks (DTNs), by analyzing empirical traces obtained by human mobility monitoring experiments. Four traces known in literature have been considered. We exploit a measure of centrality ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In this paper we study the influence of using hub nodes to relay messages in human-based delay tolerant networks (DTNs), by analyzing empirical traces obtained by human mobility monitoring experiments. Four traces known in literature have been considered. We exploit a measure of centrality

All discrete RP groups whose generators have real traces

by Elena Klimenko, Natalia Kopteva , 2005
"... ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
Abstract not found

Social Forwarding in Large Scale Networks: Insights Based on Real Trace Analysis

by Abderrahmen Mtibaa, Khaled A. Harras
"... Social forwarding, recently a hot topic in mobile opportunistic networking, faces extreme challenges from potentially large numbers of mobile nodes, vast areas, and limited communication resources. Such conditions render forwarding more challenging in large-scale networks. We observe that forwarding ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
demonstrate, based on real mobility traces, the weakness of existing social forwarding algorithms in large scale communities. We address this weakness by propos-ing strategies for partitioning these large scale communities into sub-communities based on geographic locality or social interests. We also examine

Autograph: Toward automated, distributed worm signature detection

by Hyang-ah Kim - In Proceedings of the 13th Usenix Security Symposium , 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract - Cited by 362 (3 self) - Add to MetaCart
by analyzing the prevalence of portions of flow payloads, and thus uses no knowledge of protocol semantics above the TCP level. It is designed to produce signatures that exhibit high sensitivity (high true positives) and high specificity (low false positives); our evaluation of the system on real DMZ traces
Next 10 →
Results 1 - 10 of 6,280
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University