-
1
-
-
33745674712
-
-
M. Allman, V. Paxson, On estimating end-to-end network path properties, in: Proc. ACM SIGCOMM, Vancouver, Canada, September 1999.
-
-
-
-
2
-
-
33745648762
-
-
A. Kuzmanovic, E. Knightly, Low-rate TCP-targeted denial of service attacks, in: Proc. ACM SIGCOMM, Karlsruhe, Germany, August 2003.
-
-
-
-
3
-
-
0035703761
-
-
R. Mahajan, S. Floyd, D. Wetherall, Controlling high-bandwidth flows at the congested router, in: Proc. ICNP, Riverside, CA, November 2001.
-
-
-
-
4
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Yau D.K.Y., Lui J.C.S., Liang F., and Yam Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Networking 13 1 (2005) 29-42
-
(2005)
IEEE/ACM Trans. Networking
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
5
-
-
0017930815
-
Dynamic programming algorithm optimization for spoken word recognition
-
Sakoe H., and Chiba H. Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust., Speech, Signal Proc. ASSP-26 1 (1978)
-
(1978)
IEEE Trans. Acoust., Speech, Signal Proc.
, vol.ASSP-26
, Issue.1
-
-
Sakoe, H.1
Chiba, H.2
-
6
-
-
33745653576
-
-
E. Keogh, Exact indexing of dynamic time warping, in: Proceedings of the 28th VLDB Conference, Hong Kong, China, August 2002.
-
-
-
-
7
-
-
0028377540
-
On the self-similar nature of ethernet traffic (extended version)
-
Leland W.E., Taqqu M.S., Willinger W., and Wilson D.V. On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans. Networking 2 1 (1994) 1-15
-
(1994)
IEEE/ACM Trans. Networking
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
Wilson, D.V.4
-
8
-
-
0031383380
-
Self-similarity in world wide web traffic: evidence and possible causes
-
Crovella M.E., and Bestavros A. Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans. Networking 5 6 (1997) 835-846
-
(1997)
IEEE/ACM Trans. Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
9
-
-
33745677253
-
-
J. Liu, Traffic modeling based on farima models, in: Proceedings of the 1999 IEEE Canadian Conference on Electrical and Computer Engineering, May 1999.
-
-
-
-
10
-
-
0033666420
-
-
J. Ilow, Parameter estimation in farima processes with applications to network traffic modeling, in: Proceedings of the Tenth IEEE Workshop on Statistical Signal and Array Processing, August 2000.
-
-
-
-
12
-
-
0028599989
-
-
S. Golestani, A self clocked fair queueing scheme for broadband applications, in: Proc. IEEE INFOCOM, 1994.
-
-
-
-
13
-
-
0001089750
-
Stochastic fairness queueing
-
McKenney P. Stochastic fairness queueing. Internetworking: Res. Exp. 2 (1986) 157-173
-
(1986)
Internetworking: Res. Exp.
, vol.2
, pp. 157-173
-
-
McKenney, P.1
-
14
-
-
33745644275
-
-
(2004, Jan.) Understanding and configuring mdrr/wred on the cisco 12000 series internet router. [Online]. Available: http://www.cisco.com/warp/public/63/mdrr_wred_overview.html.
-
-
-
-
15
-
-
0030189675
-
Simulation-based comparisons of tahoe, reno, and sack tcp
-
Fall K., and Floyd S. Simulation-based comparisons of tahoe, reno, and sack tcp. ACM Comput. Commun. Rev. 5 3 (1996) 5-21
-
(1996)
ACM Comput. Commun. Rev.
, vol.5
, Issue.3
, pp. 5-21
-
-
Fall, K.1
Floyd, S.2
-
16
-
-
33745657874
-
-
TCP SYN flooding and IP spoofing attacks, CERT Advisory CA- 96.21, Available from http://www.cert.org/.
-
-
-
-
17
-
-
33745666524
-
-
Smurf IP denial-of-service attacks, CERT Advisory CA-1998-01, January 1998, Available from www.cert.org/advisories/CA-98.01.html.
-
-
-
-
18
-
-
33745674305
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proc. ACM SIGCOMM, Stockholm, Sweden, August 2000.
-
-
-
-
19
-
-
0034997397
-
-
D. Song, A. Perrig, Advanced and authenticated techniques for IP traceback, in: Proc. IEEE INFOCOM, Anchorage, Alaska, 2001.
-
-
-
-
20
-
-
33745657278
-
-
Blackhole route server and tracking traffic on an IP network, Available from http://www.secsup.org/Tracking.
-
-
-
-
21
-
-
85129521050
-
-
G. Yang, M. Gerla, M.Y. Sanadidi, Defense against low-rate TCPtargeted denial-of-service attacks, in: Proc. ISCC, Alexandria, Egypt, 2004.
-
-
-
-
22
-
-
33745660587
-
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, W.T. Strayer, Hash-based ip traceback, in: ACM SIGCOMM, San Diego, August 2001.
-
-
-
-
23
-
-
33745639032
-
-
D. Katabi, M. Handley, C. Rohrs, Congestion control for high bandwidth-delay product networks, in: Proc. ACM SIGCOMM, Pittsburgh, PA, August 2002.
-
-
-
-
24
-
-
17744369470
-
-
A.M.I. Guirguis, M. Bestavros, Exploiting the transients of adaptation for roq attacks on internet resources, in: Proceedings of the 12th IEEE International Conference on Network Protocols, Oct 2004.
-
-
-
|