Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks

J Czyz, M Kallitsis, M Gharaibeh… - Proceedings of the …, 2014 - dl.acm.org
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP)
amplification, which became prominent in December 2013, have received significant global …

Large-scale measurement and characterization of cellular machine-to-machine traffic

MZ Shafiq, L Ji, AX Liu, J Pang… - IEEE/ACM transactions …, 2013 - ieeexplore.ieee.org
Cellular network-based machine-to-machine (M2M) communication is fast becoming a
market-changing force for a wide spectrum of businesses and applications such as …

Remote peering: More peering without internet flattening

I Castro, JC Cardona, S Gorinsky… - Proceedings of the 10th …, 2014 - dl.acm.org
The trend toward more peering between networks is commonly conflated with the trend of
Internet flattening, ie, reduction in the number of intermediary organizations on Internet …

A comprehensive model for web sites quality

O Signore - Seventh IEEE International Symposium on Web …, 2005 - ieeexplore.ieee.org
Many of existing criteria for evaluating Web sites quality require methods such as heuristic
evaluations, or/and empirical usability tests. This paper aims at defining a quality model and …

On economic heavy hitters: Shapley value analysis of 95th-percentile pricing

R Stanojevic, N Laoutaris, P Rodriguez - Proceedings of the 10th ACM …, 2010 - dl.acm.org
Cost control for the Internet access providers (AP) influences not only the nominal speeds
offered to the customers, but also other, more controversial, policies related to traffic sha** …

Internet traffic volumes are not Gaussian—They are log-normal: An 18-year longitudinal study with implications for modelling and prediction

M Alasmar, R Clegg, N Zakhleniuk… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
Getting good statistical models of traffic on network links is a well-known, often-studied
problem. A lot of attention has been given to correlation patterns and flow duration. The …

Scotty: General and efficient open-source window aggregation for stream processing systems

J Traub, PM Grulich, AR Cuellar, S Breß… - ACM Transactions on …, 2021 - dl.acm.org
Window aggregation is a core operation in data stream processing. Existing aggregation
techniques focus on reducing latency, eliminating redundant computations, or minimizing …

On blind mice and the elephant: understanding the network impact of a large distributed system

JS Otto, MA Sánchez, DR Choffnes… - Proceedings of the …, 2011 - dl.acm.org
A thorough understanding of the network impact of emerging large-scale distributed systems-
-where traffic flows and what it costs--must encompass users' behavior, the traffic they …

Simulating hydrological responses to climate change using dynamic and statistical downscaling methods: a case study in the Kaidu River Basin, **njiang, China

W Ba, P Du, T Liu, A Bao, M Luo, M Hassan, C Qin - Journal of Arid Land, 2018 - Springer
Climate change may affect water resources by altering various processes in natural
ecosystems. Dynamic and statistical downscaling methods are commonly used to assess …

Cache-assisted content delivery in wireless networks: A new game theoretic model

C Fang, C Liu, Z Wang, Y Sun, W Ni, P Li… - IEEE Systems …, 2020 - ieeexplore.ieee.org
With the rapid increase of mobile data traffic, efficient content delivery in wireless networks is
increasingly important to provide broadcast and multicast services. To reduce network cost …