Youtubed activities
Mar 2014
12
Mar
Network Fingerprinting: TTL-Based Router Signatures
Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures [...]
05
Mar
On the resiliency of the French Internet
This presentation focuses on the resiliency of the French Internet, studied from thepoint of view of network interconnectivity. We define a model for representing theBGP-level [...]
Feb 2014
26
Feb
Impact of the electronic architecture of optical slot switching nodes on latency in ring networks
An optical slot switching node network called POADM (packet optical add-drop multiplexers) has formerly been proposed as a flexible solution for metropolitan ring networks to [...]
26
Feb
Energy-Aware Computing with Application Processors
Energy aware computing is as ubiquitous as ubiquitous computing itself. The user experience and up-time of hand-held devices are affected directly by the squander of [...]
19
Feb
Optimal cache allocation for content-centric networking
Content-Centric Networking (CCN) is a promis-ing framework for evolving the current network architecture,advocating ubiquitous in-network caching to enhance contentdelivery. Consequently, in CCN, each router has [...]
05
Feb
Be fair to flows: a fair network is attractive and trustworthy and far more than just adequate
The subject of active queue management is again highly topical with the recent creation of a new IETF working group. Regained interest has arisen notably [...]
Jan 2014
29
Jan
Protecting Privacy While Providing Utility in Published Network Mobility Traces Using Differential Privacy
Those who design, develop and deploy computer and networked systems, have a vital interest in how these systems perform in "real-world" scenarios. But real-world conditions [...]
22
Jan
COBRA: Lean Intra-domain Routing in NDN
Named Data Networking (NDN) is an emerging In-formation Centric Networking architecture based on hierarchicalcontent names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN [...]
15
Jan
Community detection in stochastic block models via spectral methods
Community detection consists in identification of groups of similar items within a population. In the context of online social networks, it isa useful primitive for [...]
Dec 2013
11
Dec
Combating Internet Attacks Via Infiltration
Far and away the most energetic driver of modern Internet attacks is the ability of attackers to financially profit from their assaults. Many of these [...]
