000 | 04976nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-319-04918-2 | ||
003 | DE-He213 | ||
005 | 20240730174346.0 | ||
007 | cr nn 008mamaa | ||
008 | 140228s2014 sz | s |||| 0|eng d | ||
020 |
_a9783319049182 _9978-3-319-04918-2 |
||
024 | 7 |
_a10.1007/978-3-319-04918-2 _2doi |
|
050 | 4 | _aQA76.9.E94 | |
072 | 7 |
_aUYD _2bicssc |
|
072 | 7 |
_aCOM011000 _2bisacsh |
|
072 | 7 |
_aUYD _2thema |
|
082 | 0 | 4 |
_a004.24 _223 |
245 | 1 | 0 |
_aPassive and Active Measurement _h[electronic resource] : _b15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings / _cedited by Michalis Faloutsos, Aleksandar Kuzmanovic. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 282 p. 118 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Communication Networks and Telecommunications, _x2945-9184 ; _v8362 |
|
505 | 0 | _aRadio Prophet: Intelligent Radio Resource Deallocation for Cellular Networks -- Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis -- Diagnosing Path Inflation of Mobile Client Traffic -- An End-to-End Measurement Study of Modern Cellular Data Networks -- A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option -- Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping -- On Searching for Patterns in Traceroute Responses -- Volume-Based Transit Pricing: Is 95 the Right Percentile? -- Dissecting Round Trip Time on the Slow Path with a Single Packet -- Is Our Ground-Truth for Traffic Classification Reliable? -- Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels -- The Need for End-to-End Evaluation of Cloud Availability -- Exposing Inconsistent Web Search Results with Bobble -- Modern Application Layer Transmission Patterns from a Transport Perspective -- Third-Party Identity Management Usage on the Web -- Understanding the Reachability of IPv6 Limited Visibility Prefixes -- Violation of Inter domain Routing Assumptions -- Here Be Web Proxies -- Towards an Automated Investigation of the Impact of BGP Routing Changes on Network Delay Variations -- Peering at the Internet's Frontier: A First Look at ISP Interconnectivity in Africa -- Assessing DNS Vulnerability to Record Injection -- How Vulnerable Are Unprotected Machines on the Internet? -- A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? -- On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records -- Scaling Bandwidth Estimation to High Speed Networks -- Scalable Accurate Consolidation of Passively Measured Statistical Data -- A Needle in the Haystack - Delay Based User Identification in Cellular Networks -- Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP -- On Understanding User Interests through Heterogeneous DataSources -- Nightlights: Entropy-Based Metrics for Classifying Dark space Traffic Patterns -- Distributed Active Measurement of Internet Queuing Delays. | |
520 | _aThis book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included. | ||
650 | 0 |
_aElectronic digital computers _xEvaluation. _921495 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aSystem Performance and Evaluation. _932047 |
650 | 2 | 4 |
_aComputer Communication Networks. _9112179 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aFaloutsos, Michalis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9112180 |
|
700 | 1 |
_aKuzmanovic, Aleksandar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9112181 |
|
710 | 2 |
_aSpringerLink (Online service) _9112182 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319049175 |
776 | 0 | 8 |
_iPrinted edition: _z9783319049199 |
830 | 0 |
_aComputer Communication Networks and Telecommunications, _x2945-9184 ; _v8362 _9112183 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-04918-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89390 _d89390 |