-
1
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
2
-
-
0018456171
-
Universal classes of hash functions
-
J. Carter and M. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, pp. 143-154
-
-
Carter, J.1
Wegman, M.2
-
3
-
-
0035360861
-
Trajectory sampling for direct traffic observation
-
Jun.
-
N. Duffield and M. Grossglauser, "Trajectory sampling for direct traffic observation," IEEE Trans. Netw., vol. 9, no. 3, pp. 280-292, Jun. 2001.
-
(2001)
IEEE Trans. Netw.
, vol.9
, Issue.3
, pp. 280-292
-
-
Duffield, N.1
Grossglauser, M.2
-
4
-
-
1242287693
-
Estimating flow distribution from sampled flow statistics
-
Aug.
-
N. Duffield, C. Lund, and M. Thorup, "Estimating flow distribution from sampled flow statistics," in Proc. ACM SIGCOMM, Aug. 2003, pp. 325-336.
-
(2003)
Proc. ACM SIGCOMM
, pp. 325-336
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
5
-
-
33744912228
-
New directions in traffic measurement and accounting
-
Aug.
-
C. Estan and G. Varghese, "New directions in traffic measurement and accounting," in Proc. ACM SIGCOMM, Aug. 2002, pp. 323-336.
-
(2002)
Proc. ACM SIGCOMM
, pp. 323-336
-
-
Estan, C.1
Varghese, G.2
-
6
-
-
19544394713
-
Bitmap algorithms for counting active flows on high speed links
-
Oct.
-
C. Estan and G. Varghese, "Bitmap algorithms for counting active flows on high speed links," in Proc. ACM/SIGCOMMIMC, Oct. 2003, pp. 153-166.
-
(2003)
Proc. ACM/SIGCOMMIMC
, pp. 153-166
-
-
Estan, C.1
Varghese, G.2
-
7
-
-
0033294349
-
Inter-AS traffic patterns and their implications
-
Dec.
-
W. Fang and L. Peterson, "Inter-AS traffic patterns and their implications," in Proc. IEEE GLOBECOM, Dec. 1999, pp. 1859-1868.
-
(1999)
Proc. IEEE GLOBECOM
, pp. 1859-1868
-
-
Fang, W.1
Peterson, L.2
-
8
-
-
19544362049
-
Inverting sampled traffic
-
Oct.
-
N. Hohn and D. Veitch, "Inverting sampled traffic," in Proc. ACM/SIGCOMM IMC, Oct. 2003, pp. 222-233.
-
(2003)
Proc. ACM/SIGCOMM IMC
, pp. 222-233
-
-
Hohn, N.1
Veitch, D.2
-
9
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDN and web sites
-
May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDN and web sites," in Proc. World Wide Web Conf., May 2002, pp. 293-304.
-
(2002)
Proc. World Wide Web Conf.
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
10
-
-
0348252034
-
A simple algorithm for finding frequent elements in streams and bags
-
R. Karp, S. Shenker, and C. Papadimitriou, "A simple algorithm for finding frequent elements in streams and bags," ACM Trans. Database Syst., vol. 28, pp. 51-55, 2003.
-
(2003)
ACM Trans. Database Syst.
, vol.28
, pp. 51-55
-
-
Karp, R.1
Shenker, S.2
Papadimitriou, C.3
-
11
-
-
8344259982
-
Data streaming algorithms for efficient and accurate estimation of flow size distribution
-
A. Kumar, M. Sung, J. Xu, and J. Wang, "Data streaming algorithms for efficient and accurate estimation of flow size distribution," in Proc. ACM SIGMETRICS, 2004, pp. 177-188.
-
(2004)
Proc. ACM SIGMETRICS
, pp. 177-188
-
-
Kumar, A.1
Sung, M.2
Xu, J.3
Wang, J.4
-
12
-
-
8344263038
-
Space-code bloom filter for efficient per-flow traffic measurement
-
Mar.
-
A. Kumar, J. Xu, J. Wang, O. Spatschek, and L. Li, "Space-code bloom filter for efficient per-flow traffic measurement," in Proc. IEEE INFOCOM, Mar. 2004, pp. 1762-1773.
-
(2004)
Proc. IEEE INFOCOM
, pp. 1762-1773
-
-
Kumar, A.1
Xu, J.2
Wang, J.3
Spatschek, O.4
Li, L.5
-
14
-
-
84859683269
-
Cisco netflow
-
[Online]
-
CISCO Tech Notes, "Cisco netflow." [Online]. Available: available at http://www.cisco.com/warp/public/732/netflow/index.html.
-
CISCO Tech Notes
-
-
-
15
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxon, "An analysis of using reflectors for distributed denial-of-service attacks," Comput. Commun. Rev., vol. 31, pp. 38-47, 2001.
-
(2001)
Comput. Commun. Rev.
, vol.31
, pp. 38-47
-
-
Paxon, V.1
-
16
-
-
0036346558
-
A novel mechanism for data streaming across multiple IP links for improving throughput and reliability in mobile environments
-
Jun.
-
D. S. Phatak and T. Goff, "A novel mechanism for data streaming across multiple IP links for improving throughput and reliability in mobile environments," in Proc. IEEE INFOCOM, Jun. 2002, pp. 773-778.
-
(2002)
Proc. IEEE INFOCOM
, pp. 773-778
-
-
Phatak, D.S.1
Goff, T.2
-
17
-
-
0141552473
-
Flowscan: A network traffic flow reporting and visualization tool
-
D. Plonka, "Flowscan: A network traffic flow reporting and visualization tool," in Proc. USENIX USA, 2000, pp. 305-318.
-
(2000)
Proc. USENIX USA
, pp. 305-318
-
-
Plonka, D.1
-
18
-
-
0031366315
-
Efficient hardware hashing functions for high performance computers
-
Dec.
-
M. Ramakrishna, E. Fu, and E. Bahcekapili, "Efficient hardware hashing functions for high performance computers," IEEE Trans. Comput., vol. 46, no. 2, pp. 1378-1381, Dec. 1997.
-
(1997)
IEEE Trans. Comput.
, vol.46
, Issue.2
, pp. 1378-1381
-
-
Ramakrishna, M.1
Fu, E.2
Bahcekapili, E.3
-
19
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
M. Roesch, "Snort-lightweight intrusion detection for networks," in Proc. USENIX Syst. Admin. Conf., 1999, pp. 229-238.
-
(1999)
Proc. USENIX Syst. Admin. Conf.
, pp. 229-238
-
-
Roesch, M.1
-
20
-
-
85112686126
-
New streaming algorithms for fast detection of superspreaders
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum, "New streaming algorithms for fast detection of superspreaders," in Proc. NDSS, 2005.
-
(2005)
Proc. NDSS
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
21
-
-
0025449292
-
A linear-time probabilistic counting algorithm for database applications
-
Jun.
-
K. Y. Whang, B. T. Vander-Zanden, and H. M. Taylor, "A linear-time probabilistic counting algorithm for database applications," IEEE Trans. Database Syst., pp. 208-229, Jun. 1990.
-
(1990)
IEEE Trans. Database Syst.
, pp. 208-229
-
-
Whang, K.Y.1
Vander-Zanden, B.T.2
Taylor, H.M.3
-
22
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and application
-
Oct.
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund, "Online identification of hierarchical heavy hitters: Algorithms, evaluation, and application," in Proc. ACM/SIGCOMM IMC, Oct. 2004, pp. 101-114.
-
(2004)
Proc. ACM/SIGCOMM IMC
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
23
-
-
33244459866
-
Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices
-
Jun.
-
Q. Zhao, A. Kumar, J. Wang, and J. Xu, "Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices," in Proc. ACM SIGMETRICS, Jun. 2005, pp. 350-361.
-
(2005)
Proc. ACM SIGMETRICS
, pp. 350-361
-
-
Zhao, Q.1
Kumar, A.2
Wang, J.3
Xu, J.4
|