A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
WiFi can be the weakest link of round trip network latency in the wild
2016
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
We observe that WiFi hop can be the weakest link in the round trip network latency: more than 50% (10%) of TCP packets suffer from WiFi hop latency larger than 20ms (100ms), and WiFi hop latency occupies ...
more than 60% in more than half of the round trip network latency. ...
We sincerely thank Kaixin Sui and Dapeng Liu for providing drawing template of decision tree. We thank Yaodong Zhang for helping check technical details in this paper. ...
doi:10.1109/infocom.2016.7524396
dblp:conf/infocom/PeiZCTMMLP16
fatcat:uy3toh6nxrdjrcmwnxmisxhk6m
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection
[chapter]
2016
Lecture Notes in Computer Science
Our proposed solution can be readily added to existing network monitoring infrastructures and includes among other things plausibility checks of location update trails, monitoring of device-specific round ...
The scope of this paper is the detection of attacks on the radio access network (RAN) in G (GE/RAN), G (UTRAN), and LTE networks (E-UTRAN). ...
Acknowledgments We want to thank the whole crew of the core network security team and radio access network team at T-Mobile. They have been a great help. ...
doi:10.1007/978-3-319-45719-2_13
fatcat:tazpfo7cvfhplmsgjujwedbpli
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems
[chapter]
2009
Lecture Notes in Computer Science
Further energy savings for given platforms can only be achieved by downsizing the packet, e.g. by means of in-network processing or data compression. ...
A common node in a WSN is usually equipped with a microcontroller and a radio transceiver. A challenge in large networks is to keep the firmware of the nodes up to date. ...
This add-on allows a user to analyze the link quality between several meshed Wifi nodes. This can be used to build up a stable working backbone network. ...
doi:10.1007/978-3-642-02118-3_2
fatcat:prjsfyqcojcnpcetw7vfnvqwpy
Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020
2020
For this semester the arwards where given to Bernhard Vorhofer with the paper Extending ZMap: Round-Trip Time Measurement via ICMP and TCP and Simon Bachmeier with the paper Network Simulation with OMNet ...
In the context of the seminar, each student individually works on a relevant topic in the domain of computer networks supervised by one or more advisors. ...
In our research, we found two viable methods of measuring round-trip time using TCP. ...
doi:10.2313/net-2020-11-1
fatcat:7og3fpqf5zfpfldmtsp57bbcg4
Security And Privacy For Ubiquitous Mobile Devices
2016
Our third approach specifically, presents a unique attack, which has not been seen"in the wild", in an effort to keep ahead of malicious efforts. ...
It is estimated that in the United States approximately two thirds of adults own a smartphone, and that for many, these devices are their primary method of accessing the Internet [99] . ...
As the message length grows larger, the round trip time and packet receiving time increases. ...
doi:10.21220/s2ks3d
fatcat:can6ukokd5cx5j4hr55mek6mn4
Measuring and Implementing Internet Backbone Security
[article]
2016
In this thesis, we start from the observation that the Internet is a critical infrastructure, which needs severe protection. ...
We contribute tools, methodologies, and measurement results to improve the current state of art as well as operational practice. ...
Acknowledgments Successful research is linked to passion that is shared with the community. It is not based on working in the ivory tower but on open-minded discussions with friends and colleagues who ...
doi:10.17169/refubium-15515
fatcat:xnnrr5rmrffbvmugq7qapdrsqe
Human Activity Recognition in Smart Environments (Dagstuhl Seminar 12492) Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501) Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502) Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511) Representation, Analysis and Visualization of Moving Objects (Dagstuhl Seminar 12512)
2012
unpublished
All three panels are linked and the geographical display as well as the time-line can be used for zooming, panning or selecting a subset of the data. ...
Personal introductions We started out by a three rounds of personal introductions of the participants. ...
Methods can be separated depending on the nature of the results (entities or fields?), interrelations can be found to clustering. ...
fatcat:lqejrqkk6fdhnnwiufoktwlf74
Soutenue le par Anouk MUKHERJEE F-X de Vaujany
2017
unpublished
More indirect relationships can be gleaned from the transcripts linking the body with ICT. ...
Widely available Internet connectivity -either through WiFi or 3G -mean that any portable wireless device is in theory mobile and can be used anywhere and at any time. ...
The results clearly demonstrate the inadequacy of affordance theory for the study of ICT in general. ...
fatcat:2jx7g64azjepngq2bj6d7smu7y