[HTML][HTML] Order statistics and estimating cardinalities of massive data sets

F Giroire - Discrete Applied Mathematics, 2009 - Elsevier
A new class of algorithms to estimate the cardinality of very large multisets using constant
memory and doing only one pass on the data is introduced here. It is based on order …

Data mirroring in a service

J Regan - US Patent 7,486,674, 2009 - Google Patents
Data mirroring in a service such as a virtual private LAN service is disclosed. Data packets,
segments, frames, or other forms of encapsulation may be mirrored off of a core network (eg …

On traffic characteristics of a broadband wireless internet access

R Pries, F Wamser, D Staehle, K Heck… - 2009 Next Generation …, 2009 - ieeexplore.ieee.org
Internet traffic measurements and traffic characterization are essential for managing and
optimizing network infrastructures. The increasing number of wireless Internet users and the …

Covert channel for one-way delay measurements

M Cola, G De Lucia, D Mazza… - 2009 Proceedings of …, 2009 - ieeexplore.ieee.org
We propose a novel, passive, nonintrusive method to measure the one-way delay of all the
packets flowing between customer sites connected by a provider backbone. Our approach …

Concepts for self-protection

T Zseby, H Pfeffer, S Steglich - Autonomic Computing and Networking, 2009 - Springer
Network protection should be a number one priority on every network operator's list. Even
the best network is useless, if an intruder can gain control. Although the research community …

Passive, automatic detection of network server performance anomalies in large networks

J Terrell - 2009 - search.proquest.com
Abstract “Network management” in a large organization often involves—whether explicitly or
implicitly—the responsibility for ensuring the availability and responsiveness of network …

Towards a Future Internet: Node Collaboration for Autonomic Communication.

T Zseby, T Hirsch, M Kleis… - Future Internet …, 2009 - books.google.com
The Internet today is a complex agglomerate of protocols that inherits the grown legacies of
decades of patchwork solutions. Network management costs explode. Security problems are …

Mesures et Caractérisation du Trafic dans le Réseau National Universitaire (RNU)

KR Houerbi - 2009 - theses.hal.science
Cette thèse porte sur la mesure et la caractérisation du trafic dans le Réseau National
Universitaire (RNU) avec des applications à la détection des anomalies. Pour ce faire, une …

[PDF][PDF] Distributed malware detection

P Kenyeres, T Mészáros, A Szentgyörgyi, G Fehér - math.bme.hu
Widespread usage of broadband Internet connections has allowed the birth of a new threat
against service providers and subscribers as well. Botnets are vast networks of …

QuIT: quantitative IP traceback

S Dai, X Li - 2009 5th International Conference on Wireless …, 2009 - ieeexplore.ieee.org
Traceback is the technique to trace packets back to the sources or the routers near the
sources, which is essential while defending against IP spoofing and denial of service …