Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Augustin Soule"'
Autor:
Branislav Kveton, Muhammad Jehangir Amjad, Christophe Diot, Dimitris Konomis, Augustin Soule, Xiaolong Yang
Cloud networks are difficult to monitor because they grow rapidly and the budgets for monitoring them are limited. We propose a framework for estimating network metrics, such as latency and packet loss, with guarantees on estimation errors for a fixe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9316b8c752e170013cdc020f1300275b
http://arxiv.org/abs/2109.07743
http://arxiv.org/abs/2109.07743
Publikováno v:
ACM SIGCOMM Computer Communication Review. 38:35-38
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly detectors on manually labeled traces is both important and unavoidable.
Publikováno v:
IEEE/ACM Transactions on Networking. 15:485-498
In this paper we propose a new approach for dealing with the ill-posed nature of traffic matrix estimation. We present three solution enhancers: an algorithm for deliberately changing link weights to obtain additional information that can make the un
Autor:
Ramanujan K. Sheshadri, Augustin Soule, Jaideep Chandrashekar, Anna-Kaisa Pietilainen, Dimitrios Koutsonikolas, Henrik Lundgren, Ioannis Pefkianakis
Publikováno v:
INFOCOM Workshops
In this paper, we collect and analyze data from 85 smartphone users over a 9 month period. Different from existing work, we study device usage patterns in concert with network performance in space and time. Our results uncover predictable mobility pa
Autor:
Koen Van Oost, Karel Van Doorselaer, Jaideep Chandrashekar, Ioannis Pefkianakis, Henrik Lundgren, Pascal Le Guyadec, Martin May, Christophe Diot, Augustin Soule
Publikováno v:
INFOCOM
In this paper, we analyze a large dataset of passive wireless measurements and obtain insights about wireless performance. We monitor 167 homes continuously for 4 months from the vantage point of the gateway, which allows us to capture all the activi
Publikováno v:
SIGMETRICS
ACM Sigmetrics
ACM Sigmetrics, Jun 2004, New York, United States. pp.49-60, ⟨10.1145/1005686.1005696⟩
ACM Sigmetrics
ACM Sigmetrics, Jun 2004, New York, United States. pp.49-60, ⟨10.1145/1005686.1005696⟩
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the different behavior of flows belonging to these classes. In this paper
Autor:
Augustin Soule, Renata Teixeira, Jon Whiteaker, Christophe Diot, Martin May, Fabio Picconi, Fabian Schneider
Publikováno v:
Computer Communication Review
Computer Communication Review, 2012, pp.38-43
Computer Communication Review, Association for Computing Machinery, 2012, pp.38-43
Computer Communication Review, 2012, pp.38-43
Computer Communication Review, Association for Computing Machinery, 2012, pp.38-43
International audience; The success of over-the-top (OTT) services reflects users' demand for personalization of digital services at home. ISPs propose fulfilling this demand with a cloud delivery model, which would simplify the management of the ser
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::379910dc5f029d9a88920def7181ca82
https://hal.sorbonne-universite.fr/hal-00835041
https://hal.sorbonne-universite.fr/hal-00835041
Publikováno v:
SIGCOMM
The success of broadband residential Internet access is changing the way home users consume digital content and services. Currently, each home service requires the installation of a separate physical box (for instance, the NetFlix box or IPTV set-top
Publikováno v:
INFOCOM
The increasing adoption of high speed Internet connectivity in homes has led to the development of bandwidth hungry applications. This, in turn, induces ISPs to protect their core networks by deploying traffic shaping devices. End users, ISPs and reg
Publikováno v:
Internet Measurement Comference
Multiple network-wide anomaly detection techniques proposed in the literature define an anomaly as a statistical outlier in aggregated network traffic. The most popular way to aggregate the traffic is as a Traffic Matrix, where the traffic is divided