Skip to main content

and
  1. No Access

    Chapter

    Stream Processing Techniques for Network Management

    For network operators, understanding the types and volumes of traffic carried on the Internet is fundamental to maintaining its stability, reliability, security, and performance. Having efficient and comprehen...

    Charles D. Cranor, Theodore Johnson, Oliver Spatscheck in Data Stream Management (2016)

  2. No Access

    Chapter and Conference Paper

    RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks

    Traditionally, radio resources are released in cellular networks by statically configured inactivity timers, causing substantial resource inefficiencies. We propose a novel system RadioProphet ...

    Junxian Huang, Feng Qian, Z. Morley Mao, Subhabrata Sen in Passive and Active Measurement (2014)

  3. No Access

    Chapter and Conference Paper

    Performance Implications of Unilateral Enabling of IPv6

    While some IPv6-enabled Web sites such as Google require an explicit opt-in by IPv6-enabled clients before serving them over the IPv6 protocol, we quantify performance implications of unilateral enabling of IPv6 ...

    Hussein A. Alzoubi, Michael Rabinovich, Oliver Spatscheck in Passive and Active Measurement (2013)

  4. No Access

    Chapter and Conference Paper

    How to Reduce Smartphone Traffic Volume by 30%?

    The unprecedented growth in smartphone usage has fueled a massive increase in cellular network traffic volumes. We investigate the feasibility of applying Redundancy Elimination (RE) for today’s smartphone tra...

    Feng Qian, Junxian Huang, Jeffrey Erman, Z. Morley Mao in Passive and Active Measurement (2013)

  5. No Access

    Chapter and Conference Paper

    Network DVR: A Programmable Framework for Application-Aware Trace Collection

    Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing capture tools do not have suffici...

    Chia-Wei Chang, Alexandre Gerber, Bill Lin in Passive and Active Measurement (2010)

  6. Chapter and Conference Paper

    Streams, Security and Scalability

    Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will be...

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck in Data and Applications Security XIX (2005)

  7. No Access

    Chapter and Conference Paper

    Analysis of Communities of Interest in Data Networks

    Communities of interest (COI) have been applied in a variety of environments ranging from characterizing the online buying behavior of individuals to detecting fraud in telephone networks...

    William Aiello, Charles Kalmanek in Passive and Active Network Measurement (2005)

  8. Chapter and Conference Paper

    Fast Key Exchange with Elliptic Curve Systems

    The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field $$ \mathbb{...

    Richard Schroeppel, Hilarie Orman, Sean O’Malley in Advances in Cryptology — CRYPT0’ 95 (1995)