|
|
|
|
LEADER |
04624nam a22005055i 4500 |
001 |
978-3-319-04918-2 |
003 |
DE-He213 |
005 |
20151204171845.0 |
007 |
cr nn 008mamaa |
008 |
140228s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319049182
|9 978-3-319-04918-2
|
024 |
7 |
|
|a 10.1007/978-3-319-04918-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.E94
|
072 |
|
7 |
|a UYD
|2 bicssc
|
072 |
|
7 |
|a COM074000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.24
|2 23
|
245 |
1 |
0 |
|a Passive and Active Measurement
|h [electronic resource] :
|b 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings /
|c edited by Michalis Faloutsos, Aleksandar Kuzmanovic.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 282 p. 118 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8362
|
505 |
0 |
|
|a Radio Prophet: Intelligent Radio Resource Deallocation for Cellular Networks -- Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis -- Diagnosing Path Inflation of Mobile Client Traffic -- An End-to-End Measurement Study of Modern Cellular Data Networks -- A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option -- Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping -- On Searching for Patterns in Traceroute Responses -- Volume-Based Transit Pricing: Is 95 the Right Percentile? -- Dissecting Round Trip Time on the Slow Path with a Single Packet -- Is Our Ground-Truth for Traffic Classification Reliable? -- Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels -- The Need for End-to-End Evaluation of Cloud Availability -- Exposing Inconsistent Web Search Results with Bobble -- Modern Application Layer Transmission Patterns from a Transport Perspective -- Third-Party Identity Management Usage on the Web -- Understanding the Reachability of IPv6 Limited Visibility Prefixes -- Violation of Inter domain Routing Assumptions -- Here Be Web Proxies -- Towards an Automated Investigation of the Impact of BGP Routing Changes on Network Delay Variations -- Peering at the Internet’s Frontier: A First Look at ISP Interconnectivity in Africa -- Assessing DNS Vulnerability to Record Injection -- How Vulnerable Are Unprotected Machines on the Internet? -- A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? -- On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records -- Scaling Bandwidth Estimation to High Speed Networks -- Scalable Accurate Consolidation of Passively Measured Statistical Data -- A Needle in the Haystack - Delay Based User Identification in Cellular Networks -- Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP -- On Understanding User Interests through Heterogeneous Data Sources -- Nightlights: Entropy-Based Metrics for Classifying Dark space Traffic Patterns -- Distributed Active Measurement of Internet Queuing Delays.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
700 |
1 |
|
|a Faloutsos, Michalis.
|e editor.
|
700 |
1 |
|
|a Kuzmanovic, Aleksandar.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319049175
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8362
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-04918-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|