scispace - formally typeset
D

David Rosenbluth

Researcher at Telcordia Technologies

Publications -  6
Citations -  126

David Rosenbluth is an academic researcher from Telcordia Technologies. The author has contributed to research in topics: Network management & Address space. The author has an hindex of 3, co-authored 6 publications receiving 116 citations.

Papers
More filters
Journal ArticleDOI

The Effect of Gaze Angle and Fixation Distance on the Responses of Neurons in V1, V2, and V4

TL;DR: It is proposed that eye-position signals can be exploited by visual cortex as classical conditioning stimuli, enabling the perceptual learning of systematic relationships between point of regard and the structure of the visual environment.
Proceedings ArticleDOI

Inferring Wireless Communications Links and Network Topology from Externals Using Granger Causality

TL;DR: The link inference method presented relies upon general assumptions that hold true for a wide variety of communications, and is therefore applicable to inferring the link topology of broad classes of wireless networks, regardless of the nature of the Medium Access Control (MAC) protocol used.
Patent

Receptor array for managing network traffic data

TL;DR: In this paper, a lens may identify or filter source and destination addresses in an address space, or identify and filter other network information of interest, such as IP header information, which can be used in real-time network management and to identify anomalous conditions such as distributed denial of service attacks.
Patent

Imaging system for network traffic data

TL;DR: In this article, a system for filtering and processing network traffic data and for providing visual representations of the processed data is presented, which can be used in real-time network management and to identify anomalous conditions such as distributed denial of service attacks.
Patent

Lens-based apparatus and method for filtering network traffic data

TL;DR: In this paper, a lens may identify or filter source and destination addresses in an address space, or identify and filter other network information of interest, which can be used in real-time network management and identify anomalous conditions such as distributed denial of service attacks.