A critical look at power law modelling of the Internet

RG Clegg, C Di Cairano-Gilfedder, S Zhou - Computer Communications, 2010 - Elsevier
This paper takes a critical look at the usefulness of power law models of the Internet. The
twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is …

Detecting jumps from Lévy jump diffusion processes

SS Lee, J Hannig - Journal of Financial Economics, 2010 - Elsevier
Recent asset-pricing models incorporate jump risk through Lévy processes in addition to
diffusive risk. This paper studies how to detect stochastic arrivals of small and big Lévy …

Cooperative multi-agent bandits with heavy tails

A Dubey - International conference on machine learning, 2020 - proceedings.mlr.press
We study the heavy-tailed stochastic bandit problem in the cooperative multi-agent setting,
where a group of agents interact with a common bandit problem, while communicating on a …

Flow length and size distributions in campus Internet traffic

P Jurkiewicz, G Rzym, P Boryło - Computer Communications, 2021 - Elsevier
The efficiency of flow-based networking mechanisms strongly depends on traffic
characteristics and should thus be assessed using accurate flow models. For example, in …

Radio base stations in the cloud

B Haberland, F Derakhshan… - Bell Labs Technical …, 2013 - ieeexplore.ieee.org
During the past few years, architectures for cellular radio networks like 3rd Generation
Partnership Project (3GPP) Long Term Evolution (LTE) have evolved towards flatter …

Multiplexing gains achieved in pools of baseband computation units in 4G cellular networks

T Werthmann, H Grob-Lipski… - 2013 IEEE 24th Annual …, 2013 - ieeexplore.ieee.org
The tremendous increase of mobile user traffic load within the last few years forces us to
efficiently use the wireless network and processing resources. Cloud computing and …

Long-range dependence analysis of Internet traffic

C Park, F Hernández-Campos, L Le… - Journal of Applied …, 2011 - Taylor & Francis
Long-range-dependent time series are endemic in the statistical analysis of Internet traffic.
The Hurst parameter provides a good summary of important self-similar scaling properties …

Understanding performance interference in next-generation HPC systems

OH Mondragon, PG Bridges, S Levy… - SC'16: Proceedings …, 2016 - ieeexplore.ieee.org
Next-generation systems face a wide range of new potential sources of application
interference, including resilience actions, system software adaptation, and in situ analytics …

Spatio-temporal modeling of traffic workload in a campus WLAN

F Hernández-Campos, M Karaliopoulos… - Proceedings of the 2nd …, 2006 - dl.acm.org
Campus wireless LANs (WLANs) are complex systems with hundreds of access points (APs)
and thousands of users. Their performance analysis calls for realistic models of their …

Honeyboost: Boosting honeypot performance with data fusion and anomaly detection

S Kandanaarachchi, H Ochiai, A Rao - Expert Systems with Applications, 2022 - Elsevier
With insider attacks becoming more common and costing organizations more every year, it
has never been more crucial to be able to predict when an insider attack may happen …