scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2005"


Journal ArticleDOI
TL;DR: This paper presents a detailed study on recent advances and open research issues in WMNs, followed by discussing the critical factors influencing protocol design and exploring the state-of-the-art protocols for WMNs.

4,205 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present a timing attack against OpenSSL and demonstrate that timing attacks against network servers are practical and therefore security systems should defend against them, and they show that timing attack applies to general software systems.

850 citations


Journal ArticleDOI
TL;DR: Techniques and algorithms developed in the framework of Statistical Learning Theory are applied to the problem of determining the location of a wireless device by measuring the signal strength values from a set of access points (location fingerprinting), with the advantage of a low algorithmic complexity in the normal operating phase.

602 citations


Journal ArticleDOI
TL;DR: An intrusion detection system that uses a number of different anomaly detection techniques to detect attacks against web servers and web-based applications and can be deployed in very different application environments without having to perform time-consuming tuning and configuration.

273 citations


Journal ArticleDOI
TL;DR: This paper addresses issues related to when should the gateway be relocated, where it would be moved to and how to handle its motion without negative effect on data traffic, and presents two approaches that factor in the traffic pattern for determining a new location of the gateway for optimized communication energy and timeliness.

183 citations


Journal ArticleDOI
TL;DR: This paper presents a new mechanism, called BGP with root cause notification (BGP-RCN), that provides an upper bound of O(d) on routing convergence delay for BGP, where d is the network diameter as measured by the number of AS hops.

158 citations


Journal ArticleDOI
TL;DR: This work designs and conducts user studies that measure the impact of latency on user performance on three of the most popular RTS games and finds modest statistical correlations between user performance and latency for exploration, but very weak correlations for building and combat.

125 citations


Journal ArticleDOI
TL;DR: This work explores the use of the wavelet spectrum, whose slope is commonly used to estimate the Hurst parameter of long-range dependence, and shows that much more than simple slope estimates are needed for detecting important traffic features.

115 citations


Journal ArticleDOI
TL;DR: An innovative aspect of the presented approach is that it combines all relevant subproblems, concerning node locations, node sizes, and object placement, and solves them jointly in a single optimization step.

114 citations


Journal ArticleDOI
TL;DR: A new methodology to perform passive testing based on invariants, which introduces a new notion of invariants to deal with more subtle properties, and presents algorithms to decide the correctness of the proposed invariants with respect to a given specification.

108 citations


Journal ArticleDOI
TL;DR: This paper proposes a new TCP scheme, called TCP New Jersey, which is capable of distinguishing wireless packet losses from congestion packet losses, and reacting accordingly, and minimizes the network congestion, reduces the network volatility, and stabilizes the queue lengths while achieving more throughput than other TCP schemes.

Journal ArticleDOI
TL;DR: This paper concerns a geometric disk problem motivated by base station placement issues arising in wireless network design and a polynomial time approximation scheme is presented for this problem.

Journal ArticleDOI
TL;DR: It is argued that the multiple time-scale nature of the generation of traffic and transport protocols make the observation of LRD inevitable, and an alternative model explaining the LRD phenomena of Internet traffic is presented.

Journal ArticleDOI
TL;DR: The proposed Radial-basis-function neural network detector for Distributed-Denial-of-Service (DDoS) attacks in public networks based on statistical features estimated in short-time window analysis of the incoming data packets showed detection rate better than 98% of DDoS attacks.

Journal ArticleDOI
TL;DR: Tstat is presented, a tool for the collection and statistical analysis of TCP/IP traffic, which, in addition to recognized performance figures, infers TCP connection status from traces and computes over 80 different performance statistics at both the IP and TCP layers, allowing a good insight in the network performance.

Journal ArticleDOI
TL;DR: A novel distributed algorithm to select game servers for a group of clients participating in a large scale interactive online game session is presented and it is shown that the performance is comparable to, or sometimes even better than, that of centralized greedy algorithms, which require global information and extensive computations.

Journal ArticleDOI
TL;DR: The proposed mechanisms in the Web Application Vulnerability and Error Scanner (WAVES)--a black-box testing framework for automated Web application security assessment--are implemented and the results show that WAVES is a feasible platform for assessing Web applicationSecurity.

Journal ArticleDOI
TL;DR: An architecture for seamless location-aware integration of WLAN hotspots into cellular networks is presented and an analysis for an optimal handoff decision in moving in and out of a hotspot is provided.

Journal ArticleDOI
TL;DR: In this article, the semantics of message sequence charts can be defined algebraically in the theory of interaction of agents and environments, using this algebra, one can split message sequence chart scenarios into sets of Hoare triples consisting of precondition, the specification of a finite process, and a postcondition.

Journal ArticleDOI
TL;DR: This work presents WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack, and extends this system with a credential-based micropayment scheme that combines access control and payment authorization in one operation.

Journal ArticleDOI
TL;DR: A new rate-based active queue management algorithm, called Yellow, is proposed, which outperforms the recently proposed AQM algorithms in terms of link utilization, packet loss and robust performance through extensive simulations.

Journal ArticleDOI
TL;DR: Results show that a demographic placement provides closer landmarks and more accurate location estimations for most hosts, and experiments show that other similarity models outperform the commonly adopted Euclidean distance, resulting then in a more accurate geographic location of Internet hosts.

Journal ArticleDOI
TL;DR: The evidence for multifractal behaviour of aggregate TCP traffic is reviewed, and it is shown that in many ways it is weak, and an alternative point process model with strong physical meaning is argued for.

Journal ArticleDOI
TL;DR: A deep analysis of long-range dependence in a continually evolving Internet traffic mix by employing a number of recently developed statistical methods and found and analyzed several of the time series that exhibited more "bursty" characteristics than could be modeled as fractional Gaussian noise.

Journal ArticleDOI
TL;DR: A novel hierarchical scheme based on threshold cryptography to address both security and efficiency issues of key management and certification service in Mobile Ad hoc Network (MANET).

Journal ArticleDOI
TL;DR: This work identifies the minimal subset of XPath that is needed, thus allowing matching programs to potentially use a smaller memory footprint and gives an APPEL to XPath translator that shows that XPath is as expressive as APPEL.

Journal ArticleDOI
TL;DR: The heuristic TAG uses the overlap among routes from the source to group members to construct an efficient overlay network in a distributed, low-overhead manner, and is effective in reducing delays and duplicate packets.

Journal ArticleDOI
TL;DR: This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions by summarized work done by the Operating Missions as Nodes on the Internet project at NASA/GSFC since 1997.

Journal ArticleDOI
TL;DR: No verification tables are required in the remote server, and only one hash function computation and one modular multiplication computation are costed in smart card, resulting in a more efficient remote user authentication scheme.

Journal ArticleDOI
TL;DR: This paper proposes a model for the wireless local area network (WLAN) design problem with performance guarantees and proposes a tabu search algorithm to find solutions for real-size instances of the problem.