A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Estimating the access link quality by active measurements
2010
2010 22nd International Teletraffic Congress (lTC 22)
The access link quality experienced by the end users depends on the amount of traffic and on the presence of network anomalies. ...
Different techniques exist to detect anomalies, but little attention has been devoted to quantify the access link quality and to which extent network anomalies affect the end user's access link experience ...
, i.e., X, based on the results of the detection mechanism: 1 in case of detected network anomaly and 0 otherwise. ...
doi:10.1109/itc.2010.5608738
dblp:conf/teletraffic/CascellaB10
fatcat:7fmajbrk3vdx5dde3dvrxivube
A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks
2017
Sensors
With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. ...
It is assumed that one server is a protected node, all of the links between the node and all external ones form a generalized star network according to different IPs, and a large number of normal network ...
The detection category of research uses anomaly-based detection methods to detect DDoS attacks. ...
doi:10.3390/s17030553
pmid:28282962
pmcid:PMC5375839
fatcat:thfuywr7yjczrpkze7n6bxugxm
NETCONF agent for link state monitoring
2012
2012 IEEE International Conference on Communications (ICC)
NETCONF is a new technology that includes monitoring capabilities and defines a fault-detection mechanism based on sending notifications. ...
Fault detection mechanisms have a major importance for network managers, allowing them to respond to system failures, resolving or mitigating their effects. ...
This paper describes the implementation, and the corresponding performance evaluation, of a network link-state monitor based on NETCONF. ...
doi:10.1109/icc.2012.6364912
dblp:conf/icc/LoureiroGN12
fatcat:jg2kxm5bsnhtxkj4bqeftkmd3a
Link spamming Wikipedia for profit
2011
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11
The status quo spamming model relies on link persistence to accumulate exposures, a strategy that fails given the diligence of the Wikipedia community. ...
Statistical estimation suggests our novel model would produce significantly more link exposures than status quo techniques. ...
Signature-Based Detection Given that the spam model is blatant and aggressive in nature, signature-based detection is a logical mitigation choice. ...
doi:10.1145/2030376.2030394
dblp:conf/ceas/WestCVSL11
fatcat:gb3z74ahpjaa3lwuhlwohfcb2a
Medium Access Control With Physical-Layer-Assisted Link Differentiation
2008
IEEE Transactions on Vehicular Technology
Based on different users' channel states, PALD-DQMP makes use of a distributed queuing system to schedule transmissions. ...
For contention-free accesses, based on the same PHY-assisted link differentiation provided by the two modules, a new multipolling MAC protocol (PALD-MPMP) is proposed, which not only reduces the polling ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions. ...
doi:10.1109/tvt.2007.906353
fatcat:4atbm4gwxzetnl46ypznfjqmtm
The Many Faces of Link Fraud
[article]
2017
arXiv
pre-print
Most past work on social network link fraud detection tries to separate genuine users from fraudsters, implicitly assuming that there is only one type of fraudulent behavior. ...
We discuss how to leverage our insights in practice by engineering strongly performing entropy-based features and demonstrating high classification accuracy. ...
We classified the engineered entropy features from Table 6 into the following groups based on feature type: • Connection: # Followers, # Friends • Activity: # Statuses, # Lists, # Favorites • Profile ...
arXiv:1704.01420v3
fatcat:o5f2u363nbbrtklyee6qbdda7u
Are Obesity and Physical Activity Clustered? A Spatial Analysis Linked to Residential Density
2009
Obesity
AcknowledGMents We thank the Canadian Institutes of Health Research (CIHR) for their funding through grant #116338, as well as support from the Canadian Institute for Health Information and the Canadian ...
In addition, N.S. acknowledges the Michael Smith Foundation for Health Research and CIHR for their continued research support.
dIsclosure The authors declared no conflict of interest. ...
Social networks present an example of nonlinear, nonspatial, and easily obfuscated influences on incidence of obesity and physical activity. ...
doi:10.1038/oby.2009.119
pmid:19390521
fatcat:zdpal5rlgbffpilahsc5yo733m
A Novel Link Break Distance (LBD) and Pre-emptive Threshold Alarm (PTA) based Link Repair Approach for MANET
2013
International Journal of Computer Applications
Mobile ad hoc network is a temporary wireless network having movable mobile nodes as the only element of network. ...
With the exploration of active network, R-ODMRP constructs the multicast routing based on the cluster, establishes a distributed mechanism of the acknowledgment and recovery of packet delivery. ...
Indeed, the proposed scheme detects the best links based on its strength, if any, only between the nodes which are located 2-hop away to each other. ...
doi:10.5120/11953-7773
fatcat:qmr5sl3g6ngodnbdyhp4hih76u
The LTE link-layer design
2009
IEEE Communications Magazine
Furthermore, the UE sends BSRs for active radio bearers. Based on these reports, the eNB can ensure that users with high priority data are prioritized and obtain the assigned QoS characteristics. ...
SCHEDULING Because LTE is based on OFDM, it is possible to distribute available transmission resources in the frequency domain to different UEs. ...
She joined Ericsson to work in wireless access network research in 2004. ...
doi:10.1109/mcom.2009.4907407
fatcat:afmqpximc5gcnkvohyvxxtx3ay
DNMT3B oncogenic activity in human intestinal cancer is not linked to CIMP or BRAFV600E mutation
2020
iScience
To protect from cancer, normal intestinal epithelial cells respond to oncogenic BRAFV600E by activation of intrinsic p53 and p16-dependent tumor suppressor mechanisms, such as cellular senescence. ...
It has been repeatedly proposed that DNMT3B is responsible for BRAFV600E-induced CIMP in human CRC. Here we set out to test this by in silico, in vitro, and in vivo approaches. ...
According to one model in which the link between oncogene activation and CIMP can be quite indirect, oncogene-induced senescence and/or other oncogene-activated p53 and p16-dependent tumor suppressor mechanisms ...
doi:10.1016/j.isci.2020.100838
pmid:32058953
pmcid:PMC7000804
fatcat:e7dvpxkcvrce7ewd3lc77ymo2m
On demand Local Link Repair Algorithm for AODV Protocol
2011
International Journal of Computer Applications
MANET (Mobile Ad hoc Network) is a wireless self-organized distributed network. ...
This paper gives a general survey of research on local repair of link, if it is broken during communication for MANET and proposes a new local repair scheme in order to make up the deficiency of the existing ...
Scheme based on link breaks was proposed to improve route repair efficiency for realistic ad hoc networks The node initiates a RREQ
and waits for a RREP. ...
doi:10.5120/4397-6105
fatcat:62eqaofqinh2dd6zqrzvbep4mm
Resilient packet rings with heterogeneous links
2012
2012 IEEE Symposium on Computers and Communications (ISCC)
This paper investigates supporting non-uniform links in RPR. Keywords-MAN, WAN, ring networks, spatial reuse, fairness, active queue management. I. ...
The standard calls for establishing rings utilizing uniform links of the same capacity. ...
RPR networks provide resilience by two ringlets along with the disturbance detection mechanisms implemented within the RPR protocol. ...
doi:10.1109/iscc.2012.6249381
dblp:conf/iscc/YilmazA12
fatcat:xyrcdq7hfjdilaa6lgzbg7zunm
Diachronic linked data
2012
Proceedings of the First International Workshop on Open Data - WOD '12
However, the proliferation of distributed, interconnected sources of information and services on the Web poses significant new challenges for managing consistently a huge number of large datasets and their ...
The Linked Data Paradigm is one of the most promising technologies for publishing, sharing, and connecting data on the Web, and offers a new way for data integration and interoperability. ...
A FRAMEWORK FOR DIACHRONIC LINKED DATA To address the needs of the previously described application scenarios and challenges, we need to develop a distributed, service-based infrastructure for curation ...
doi:10.1145/2422604.2422610
dblp:conf/wod/AuerDPBFSBKSCPT12
fatcat:ah6pykdskfgrnfz4hy3uqzokom
Distributed Link Scheduling for TDMA Mesh Networks
2007
2007 IEEE International Conference on Communications
We present a distributed scheduling algorithm for provisioning of guaranteed link bandwidths in ad hoc mesh networks. ...
The iterative procedure is based on the distributed Bellman-Ford algorithm running on the conflict graph, whose partial view is available at every node. ...
Under this model of transmission, in TDMA networks, a receiver can only have one active link at any given time. ...
doi:10.1109/icc.2007.630
dblp:conf/icc/DjukicV07
fatcat:ny5ncm4td5hv7cz4ukkjf4gjqu
ABB: active bandwidth broker
2001
Internet Performance and Control of Network Systems II
In this paper, we shall discuss a novel design on the policy-based management for the Internet. This design deploys the concept of active networking. ...
Our goals are to distribute centralized workload of the policy-based management over multiple active nodes in the active networks, introduce mobility of the bandwidth brokers, and allows load sharing to ...
Network monitoring Monitors need to be installed over the network to observe network resource distribution and device status. ...
doi:10.1117/12.434320
fatcat:tjwhyk6m2vfgpggjgimmx7mcfy
« Previous
Showing results 1 — 15 out of 126,544 results