126,544 Hits in 8.2 sec

Estimating the access link quality by active measurements

Roberto G. Cascella, Chadi Barakat
2010 2010 22nd International Teletraffic Congress (lTC 22)  
The access link quality experienced by the end users depends on the amount of traffic and on the presence of network anomalies.  ...  Different techniques exist to detect anomalies, but little attention has been devoted to quantify the access link quality and to which extent network anomalies affect the end user's access link experience  ...  , i.e., X, based on the results of the detection mechanism: 1 in case of detected network anomaly and 0 otherwise.  ... 
doi:10.1109/itc.2010.5608738 dblp:conf/teletraffic/CascellaB10 fatcat:7fmajbrk3vdx5dde3dvrxivube

A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks

Jun Li, HanPing Hu, Qiao Ke, Naixue Xiong
2017 Sensors  
With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network.  ...  It is assumed that one server is a protected node, all of the links between the node and all external ones form a generalized star network according to different IPs, and a large number of normal network  ...  The detection category of research uses anomaly-based detection methods to detect DDoS attacks.  ... 
doi:10.3390/s17030553 pmid:28282962 pmcid:PMC5375839 fatcat:thfuywr7yjczrpkze7n6bxugxm

NETCONF agent for link state monitoring

Diogo Loureiro, Pedro Goncalves, Antonio Nogueira
2012 2012 IEEE International Conference on Communications (ICC)  
NETCONF is a new technology that includes monitoring capabilities and defines a fault-detection mechanism based on sending notifications.  ...  Fault detection mechanisms have a major importance for network managers, allowing them to respond to system failures, resolving or mitigating their effects.  ...  This paper describes the implementation, and the corresponding performance evaluation, of a network link-state monitor based on NETCONF.  ... 
doi:10.1109/icc.2012.6364912 dblp:conf/icc/LoureiroGN12 fatcat:jg2kxm5bsnhtxkj4bqeftkmd3a

Link spamming Wikipedia for profit

Andrew G. West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
The status quo spamming model relies on link persistence to accumulate exposures, a strategy that fails given the diligence of the Wikipedia community.  ...  Statistical estimation suggests our novel model would produce significantly more link exposures than status quo techniques.  ...  Signature-Based Detection Given that the spam model is blatant and aggressive in nature, signature-based detection is a logical mitigation choice.  ... 
doi:10.1145/2030376.2030394 dblp:conf/ceas/WestCVSL11 fatcat:gb3z74ahpjaa3lwuhlwohfcb2a

Medium Access Control With Physical-Layer-Assisted Link Differentiation

Fanglei Sun, V.O.K. Li, Zhifeng Diao, Zhengyuan Xu
2008 IEEE Transactions on Vehicular Technology  
Based on different users' channel states, PALD-DQMP makes use of a distributed queuing system to schedule transmissions.  ...  For contention-free accesses, based on the same PHY-assisted link differentiation provided by the two modules, a new multipolling MAC protocol (PALD-MPMP) is proposed, which not only reduces the polling  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1109/tvt.2007.906353 fatcat:4atbm4gwxzetnl46ypznfjqmtm

The Many Faces of Link Fraud [article]

Neil Shah, Hemank Lamba, Alex Beutel, Christos Faloutsos
2017 arXiv   pre-print
Most past work on social network link fraud detection tries to separate genuine users from fraudsters, implicitly assuming that there is only one type of fraudulent behavior.  ...  We discuss how to leverage our insights in practice by engineering strongly performing entropy-based features and demonstrating high classification accuracy.  ...  We classified the engineered entropy features from Table 6 into the following groups based on feature type: • Connection: # Followers, # Friends • Activity: # Statuses, # Lists, # Favorites • Profile  ... 
arXiv:1704.01420v3 fatcat:o5f2u363nbbrtklyee6qbdda7u

Are Obesity and Physical Activity Clustered? A Spatial Analysis Linked to Residential Density

Nadine Schuurman, Paul A. Peters, Lisa N. Oliver
2009 Obesity  
AcknowledGMents We thank the Canadian Institutes of Health Research (CIHR) for their funding through grant #116338, as well as support from the Canadian Institute for Health Information and the Canadian  ...  In addition, N.S. acknowledges the Michael Smith Foundation for Health Research and CIHR for their continued research support. dIsclosure The authors declared no conflict of interest.  ...  Social networks present an example of nonlinear, nonspatial, and easily obfuscated influences on incidence of obesity and physical activity.  ... 
doi:10.1038/oby.2009.119 pmid:19390521 fatcat:zdpal5rlgbffpilahsc5yo733m

A Novel Link Break Distance (LBD) and Pre-emptive Threshold Alarm (PTA) based Link Repair Approach for MANET

Poorva Shukla, Neeraj Shrivastava
2013 International Journal of Computer Applications  
Mobile ad hoc network is a temporary wireless network having movable mobile nodes as the only element of network.  ...  With the exploration of active network, R-ODMRP constructs the multicast routing based on the cluster, establishes a distributed mechanism of the acknowledgment and recovery of packet delivery.  ...  Indeed, the proposed scheme detects the best links based on its strength, if any, only between the nodes which are located 2-hop away to each other.  ... 
doi:10.5120/11953-7773 fatcat:qmr5sl3g6ngodnbdyhp4hih76u

The LTE link-layer design

A. Larmo, M. Lindstrom, M. Meyer, G. Pelletier, J. Torsner, H. Wiemann
2009 IEEE Communications Magazine  
Furthermore, the UE sends BSRs for active radio bearers. Based on these reports, the eNB can ensure that users with high priority data are prioritized and obtain the assigned QoS characteristics.  ...  SCHEDULING Because LTE is based on OFDM, it is possible to distribute available transmission resources in the frequency domain to different UEs.  ...  She joined Ericsson to work in wireless access network research in 2004.  ... 
doi:10.1109/mcom.2009.4907407 fatcat:afmqpximc5gcnkvohyvxxtx3ay

DNMT3B oncogenic activity in human intestinal cancer is not linked to CIMP or BRAFV600E mutation

Douglas MacKenzie, Neil Robertson, Iqbal Rather, Claire Reid, Gintare Sendzikaite, Hazel Cruickshanks, Tony McBryan, Andrew Hodges, Catrin Pritchard, Karen Blyth, Peter D. Adams
2020 iScience  
To protect from cancer, normal intestinal epithelial cells respond to oncogenic BRAFV600E by activation of intrinsic p53 and p16-dependent tumor suppressor mechanisms, such as cellular senescence.  ...  It has been repeatedly proposed that DNMT3B is responsible for BRAFV600E-induced CIMP in human CRC. Here we set out to test this by in silico, in vitro, and in vivo approaches.  ...  According to one model in which the link between oncogene activation and CIMP can be quite indirect, oncogene-induced senescence and/or other oncogene-activated p53 and p16-dependent tumor suppressor mechanisms  ... 
doi:10.1016/j.isci.2020.100838 pmid:32058953 pmcid:PMC7000804 fatcat:e7dvpxkcvrce7ewd3lc77ymo2m

On demand Local Link Repair Algorithm for AODV Protocol

Jyoti Jain, Roopam Gupta, T. K. Bandhopadhyay
2011 International Journal of Computer Applications  
MANET (Mobile Ad hoc Network) is a wireless self-organized distributed network.  ...  This paper gives a general survey of research on local repair of link, if it is broken during communication for MANET and proposes a new local repair scheme in order to make up the deficiency of the existing  ...  Scheme based on link breaks was proposed to improve route repair efficiency for realistic ad hoc networks The node initiates a RREQ and waits for a RREP.  ... 
doi:10.5120/4397-6105 fatcat:62eqaofqinh2dd6zqrzvbep4mm

Resilient packet rings with heterogeneous links

Mete Yilmaz, Nirwan Ansari
2012 2012 IEEE Symposium on Computers and Communications (ISCC)  
This paper investigates supporting non-uniform links in RPR. Keywords-MAN, WAN, ring networks, spatial reuse, fairness, active queue management. I.  ...  The standard calls for establishing rings utilizing uniform links of the same capacity.  ...  RPR networks provide resilience by two ringlets along with the disturbance detection mechanisms implemented within the RPR protocol.  ... 
doi:10.1109/iscc.2012.6249381 dblp:conf/iscc/YilmazA12 fatcat:xyrcdq7hfjdilaa6lgzbg7zunm

Diachronic linked data

Sören Auer, Vassilis Christophides, George Papastefanatos, Kostas Thiveos, Theodore Dalamagas, Helen Parkinson, François Bancilhon, Giorgos Flouris, Dimitris Sacharidis, Peter Buneman, Dimitris Kotzinos, Yannis Stavrakas
2012 Proceedings of the First International Workshop on Open Data - WOD '12  
However, the proliferation of distributed, interconnected sources of information and services on the Web poses significant new challenges for managing consistently a huge number of large datasets and their  ...  The Linked Data Paradigm is one of the most promising technologies for publishing, sharing, and connecting data on the Web, and offers a new way for data integration and interoperability.  ...  A FRAMEWORK FOR DIACHRONIC LINKED DATA To address the needs of the previously described application scenarios and challenges, we need to develop a distributed, service-based infrastructure for curation  ... 
doi:10.1145/2422604.2422610 dblp:conf/wod/AuerDPBFSBKSCPT12 fatcat:ah6pykdskfgrnfz4hy3uqzokom

Distributed Link Scheduling for TDMA Mesh Networks

P. Djukic, S. Valaee
2007 2007 IEEE International Conference on Communications  
We present a distributed scheduling algorithm for provisioning of guaranteed link bandwidths in ad hoc mesh networks.  ...  The iterative procedure is based on the distributed Bellman-Ford algorithm running on the conflict graph, whose partial view is available at every node.  ...  Under this model of transmission, in TDMA networks, a receiver can only have one active link at any given time.  ... 
doi:10.1109/icc.2007.630 dblp:conf/icc/DjukicV07 fatcat:ny5ncm4td5hv7cz4ukkjf4gjqu

ABB: active bandwidth broker

Kason Wong, Eddie Law, Robert D. van der Mei, Frank Huebner-Szabo de Bucs
2001 Internet Performance and Control of Network Systems II  
In this paper, we shall discuss a novel design on the policy-based management for the Internet. This design deploys the concept of active networking.  ...  Our goals are to distribute centralized workload of the policy-based management over multiple active nodes in the active networks, introduce mobility of the bandwidth brokers, and allows load sharing to  ...  Network monitoring Monitors need to be installed over the network to observe network resource distribution and device status.  ... 
doi:10.1117/12.434320 fatcat:tjwhyk6m2vfgpggjgimmx7mcfy
« Previous Showing results 1 — 15 out of 126,544 results