scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2009"


Journal ArticleDOI
TL;DR: The relationship between security and data aggregation process in wireless sensor networks is investigated and a taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area.

416 citations


Journal ArticleDOI
TL;DR: The results of these simulations show that P2P-based distribution and proxy caching can reduce network traffic significantly and allow for faster access to video clips.

387 citations


Journal ArticleDOI
TL;DR: It is concluded that decentralized architectures must focus on applying techniques to efficiently handle read operations while maintaining consistency and dealing with typical issues on decentralized systems such as churn, unbalanced loads and malicious participating nodes.

365 citations


Journal ArticleDOI
TL;DR: Sandpiper is a system that automates the task of monitoring and detecting hotspots, determining a new mapping of physical to virtual resources, resizing virtual machines to their new allocations, and initiating any necessary migrations, and it is shown that the gray-box approach can help Sandpiper make more informed decisions, particularly in response to memory pressure.

345 citations


Journal ArticleDOI
TL;DR: This work compiles a comprehensive survey of the proposed algorithms that address the physical layer impairments in the routing and wavelength assignment (RWA) problem in transparent optical networks.

311 citations


Journal ArticleDOI
TL;DR: McPAD (multiple classifier payload-based anomaly detector), a new accurate payload- based anomaly detection system that consists of an ensemble of one-class classifiers that is very accurate in detecting network attacks that bear some form of shell-code in the malicious payload.

296 citations


Journal ArticleDOI
TL;DR: Different techniques are proposed to enable the long range interconnection of nano-machines, deployed over distances from a few centimeters up to several meters, according to whether a fixed physical link is required for signal propagation or not, i.e., either wired or wireless communication.

266 citations


Journal ArticleDOI
TL;DR: This paper applies one of the approaches to solving multi-class problems with SVMs to the task of statistical traffic classification, and describes a simple optimization algorithm that allows the classifier to perform correctly with as little training as a few hundred samples.

264 citations


Journal ArticleDOI
Krishna Kant1
TL;DR: A layered model for such data centers is defined and a detailed treatment of state of the art and emerging challenges in storage, networking, management and power/thermal aspects are provided.

247 citations


Journal ArticleDOI
TL;DR: The paper presents extensive empirical analysis of the protocol along with theoretical analysis of certain aspects of its behavior, and describes a practical application of T-Man for building Chord distributed hash table overlays efficiently from scratch.

241 citations


Journal ArticleDOI
TL;DR: This paper surveys the existing research work on cognitive networks, as well as related and enabling techniques and technologies, and provides a summary of artificial intelligence techniques that are potentially suitable for the development of cognitive networks and map them to the corresponding states of the cognition loop.

Journal ArticleDOI
TL;DR: The survey begins with the merits and demerits of VoIP, followed by the Quality of Service (QoS) requirements that voice imposes and a description of test methods for the assessment of speech quality, and concludes with a discussion on the feasibility of providing VoIP over challenging satellite links.

Journal ArticleDOI
TL;DR: This paper provides three categories of thermal-aware energy-saving scheduling techniques: FCFS-Backfill-XInt and FCFS/LRH, Thermal-aware job placement enhancements to the popular first-come first-serve with back-filling (FCFS-backfill) scheduling policy, and an offline genetic algorithm for SCheduling to minimize thermal cross-INTerference (SCINT), which is suited for batch scheduling of backlogs.

Journal ArticleDOI
TL;DR: This paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network -traffic and those using deep-packet inspection, and documents the accuracy of spatial classification without training data possessing spatial diversity.

Journal ArticleDOI
TL;DR: The results show that the most tightly integrated controller approach offers the best results in terms of capacity and quality but requires more migrations per hour than the other strategies.

Journal ArticleDOI
TL;DR: This paper presents Grid-based Routing and Aggregator Selection Scheme (GRASS), a scheme for WSNs that can achieve low energy dissipation and low latency without sacrificing quality, and shows that, when compared to other schemes, GRASS improves system lifetime with acceptable levels of latency in data aggregation and without sacrificing data quality.

Journal ArticleDOI
TL;DR: The assessment of the survivability of a network with virtual connections exposed to link or node failures is addressed and results show very good correspondence between the transient loss and delay performance in simulations and in the analytic approximations.

Journal ArticleDOI
TL;DR: A statistical classification mechanism that could represent an important step towards new techniques for securing network boundaries is proposed, called Tunnel Hunter, which relies on the statistical characterization at the IP-layer of the traffic that is allowed by a given security policy.

Journal ArticleDOI
TL;DR: RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs.

Journal ArticleDOI
TL;DR: This work presents a priority-based rate control mechanism for congestion control and service differentiation in WMSNs, and distinguishes high priority real time traffic from low priority non-real time traffic, and service the input traffic based on its priority.

Journal ArticleDOI
TL;DR: A scheme in which the node identities are verified simply by analyzing the neighboring node information of each node is developed, which confirms the efficacy of the approach given a sufficient node density within the network.

Journal ArticleDOI
TL;DR: A Bayesian network is constructed that classifies automatically access log sessions as being crawler- or human-induced, by combining various pieces of evidence proven to characterize crawler and human behavior.

Journal ArticleDOI
TL;DR: Brahms is presented, an algorithm for sampling random nodes in a large dynamic system prone to malicious behavior that overcomes Byzantine attacks by a linear portion of the system and proves that each node's sample converges to an independent uniform one over time.

Journal ArticleDOI
TL;DR: To maximize source location privacy, which is evaluated by the adversary's traceback time, by designing routing protocols that distribute message flows to different routes, this paper gives the performance bound for any routing scheme and proposes WRS, a suboptimal but practical privacy-aware routing scheme.

Journal ArticleDOI
TL;DR: This work is the first to explore the use of support vector machines (SVM) for the purpose of link load forecast, and finds that while SVM robustness is more than satisfactory, accuracy results are just close to be tempting, but not enough to convince.

Journal ArticleDOI
TL;DR: This work presents a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network.

Journal ArticleDOI
TL;DR: A novel denial of service (DoS) attack that exploits the unique vulnerabilities of the signaling/control plane in 3G wireless networks is identified and an online early detection algorithm based on the statistical CUSUM method is evaluated that is robust and can identify an attack in its inception, before significant damage is done.

Journal ArticleDOI
Ravi Iyer1, Ramesh Illikkal1, Omesh Tickoo1, Li Zhao1, Padma Apparao1, Donald Newell1 
TL;DR: Through detailed measurements and simulations, this paper shows that shared resource contention affects virtual machine performance significantly and emphasize that virtual platform architectures is a must for future virtualized datacenters.

Journal ArticleDOI
TL;DR: The main purpose of this paper is to provide a comprehensive review of the research done at the MAC layer of the OSA networks, especially with reference to ad hoc network design and spark more research in this area.

Journal ArticleDOI
TL;DR: A recurrence plot-based traffic classification approach based on the analysis of non-stationary ''hidden'' transition patterns of IP traffic flows, which proved to be effective for providing a deterministic interpretation of recurrence patterns derived by complex protocol dynamics in end-to-end traffic flows.