-
1
-
-
0032090155
-
Generating representative web workloads for network and server performance evaluation
-
Madison, Wisconsin, USA, June
-
Paul Barford and Mark Crovella. Generating representative web workloads for network and server performance evaluation. In SIGMETRICS '98 / PERFORMANCE '98, Joint International Conference on Measurement and Modeling of Computer Systems, pages 151-160, Madison, Wisconsin, USA, June 1998.
-
(1998)
SIGMETRICS '98 / PERFORMANCE '98, Joint International Conference on Measurement and Modeling of Computer Systems
, pp. 151-160
-
-
Barford, P.1
Crovella, M.2
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM(CACM), 13(7):422-426, July 1970.
-
(1970)
Communications of the ACM(CACM)
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
0033204106
-
On power-law relationships of the internet topology
-
Cambridge, Massachusetts, United States, August ACM Press
-
Michails Faloutsos, Petros Faloutsos, and Christos Faloutsos. On power-law relationships of the internet topology. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, pages 251-262, Cambridge, Massachusetts, United States, August 1999. ACM Press.
-
(1999)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
6
-
-
84862399669
-
-
National Laboratory for Applied Network Research (NLANR) http://dast.nlanr.net/Projects/Iperf, 2003.
-
(2003)
-
-
-
7
-
-
0020186366
-
Designing a bloom filter for differential file access
-
September
-
Lee L. Gremillion. Designing a bloom filter for differential file access. Communications of the ACM (CACM), 25(9):600-604, September 1982.
-
(1982)
Communications of the ACM (CACM)
, vol.25
, Issue.9
, pp. 600-604
-
-
Gremillion, L.L.1
-
9
-
-
84862397790
-
-
Multi Router Traffic Grapher (MRTG) http://people.ee.ethz.ch/oetiker/ webtools/mrtg.
-
-
-
-
10
-
-
84862395626
-
-
Comoputer Emergency Response Team (CERT) http://www.cert.org.
-
-
-
-
11
-
-
8344261545
-
Packetscore: Statistical-based overload control against deistributed denial-of-service attacks
-
Hong Kong, China, March
-
Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, and Jonathan H. Chao. Packetscore: Statistical-based overload control against deistributed denial-of-service attacks. In Proceedings IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 2004.
-
(2004)
Proceedings IEEE INFOCOM 2004, the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, J.H.4
-
13
-
-
84948963615
-
Application profiling of ip traffic
-
Tampa, Florida, USA, November
-
Danielle Liu and Frank Huebner. Application profiling of ip traffic. In 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), pages 220-229, Tampa, Florida, USA, November 2002.
-
(2002)
27th Annual IEEE Conference on Local Computer Networks (LCN 2002)
, pp. 220-229
-
-
Liu, D.1
Huebner, F.2
-
14
-
-
0020805173
-
A second look at bloom filters
-
August
-
James K. Mullin. A second look at bloom filters. Communications of the ACM (CACM), 26(8):570-571, August 1983.
-
(1983)
Communications of the ACM (CACM)
, vol.26
, Issue.8
, pp. 570-571
-
-
Mullin, J.K.1
-
15
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack
-
Anchorage, Alaska, USA, April IEEE
-
Kihong Park and Heejo Lee. On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack. In Proceedings IEEE INFOCOM 2001, The Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Twenty years into the communications odyssey, volume 1, pages 338-347, Anchorage, Alaska, USA, April 2001. IEEE.
-
(2001)
Proceedings IEEE INFOCOM 2001, the Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Twenty Years into the Communications Odyssey
, vol.1
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
16
-
-
0036375949
-
Bloom filtering cache misses for accurate data speculation and prefetching
-
New York City, NY, USA, June
-
Jih-Kwon Peir, Shih-Chang Lai, Shin-Lien Lu, Jared Stark, and Konrad Lai. Bloom filtering cache misses for accurate data speculation and prefetching. In ICS 2002, Proceedings of the 2002 International Conference on Supercomputing, pages 189-198, New York City, NY, USA, June 2002.
-
(2002)
ICS 2002, Proceedings of the 2002 International Conference on Supercomputing
, pp. 189-198
-
-
Peir, J.-K.1
Lai, S.-C.2
Lu, S.-L.3
Stark, J.4
Lai, K.5
-
17
-
-
0033650584
-
Practical network support for ip traceback
-
Stockholm, Sweden, August ACM Press
-
Stefan Savage, David Wetherall, Anna R. Karlin, and Tom Anderson. Practical network support for ip traceback. In Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 295-306, Stockholm, Sweden, August 2000. ACM Press.
-
(2000)
Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
18
-
-
0034775309
-
Hash-based ip traceback
-
San Diego, CA, USA, August
-
Alex C. Snoeren, Craig Partridge, Luis A. Sancheq, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer. Hash-based ip traceback. In Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 3-14, San Diego, CA, USA, August 2001.
-
(2001)
Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sancheq, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Timothy Strayer, W.7
-
19
-
-
0036343692
-
Detecting syn flooding attacks
-
New York, USA, June IEEE
-
Haining Wang, Danlu Zhang, and Kang G. Shin. Detecting syn flooding attacks. In Proceedings IEEE INFOCOM 2002, The 21st Annual Joint Conference of the IEEE Computer and Communications Societies, New York, USA, June 2002. IEEE.
-
(2002)
Proceedings IEEE INFOCOM 2002, the 21st Annual Joint Conference of the IEEE Computer and Communications Societies
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
|