K MacMillan, T Mangla, J Saxon… - Proceedings of the 21st …, 2021 - dl.acm.org
Video conferencing applications (VCAs) have become a critical Internet application during the COVID-19 pandemic, as users worldwide now rely on them for work, school, and …
The Tor network is designed to provide users with low-latency anonymous communications. Tor clients build circuits with publicly listed relays to anonymously reach their destinations …
A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems, censors in non-democratic countries have increased their technical capabilities and can …
Y Xu, C Yu, J Li, Y Liu - Proceedings of the 2012 Internet Measurement …, 2012 - dl.acm.org
Video telephony requires high-bandwidth and low-delay voice and video transmissions between geographically distributed users. It is challenging to deliver high-quality video …
Identifying encrypted application traffic represents an important issue for many network tasks including quality of service, firewall enforcement and security. Solutions should ideally be …
D Bonfiglio, M Mellia, M Meo… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Skype is beyond any doubt the VoIP application in the current Internet application spectrum. Its amazing success has drawn the attention of telecom operators and the research …
Video telephony has recently gained its momentum and is widely adopted by end- consumers. But there have been very few studies on the network impacts of video calls and …
This paper provides an in-depth understanding of the per-frame energy consumption behavior in 802.11 wireless LAN devices. Extensive measurements are performed for seven …
A Nistico, D Markudova, M Trevisan… - … on Multimedia (ISM), 2020 - ieeexplore.ieee.org
Real-Time Communication (RTC) applications have become ubiquitous and are nowadays fundamental for people to communicate with friends and relatives, as well as for enterprises …