How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2016
1 Research Item
This paper proposes a novel paradigm for network congestion control. Instead of perpetual conflict as in TCP, a proof-of-concept first-ever protocol enabling inter-flow communication without infrastructure support thru a side channel constructed on generic FIFO queue behaviour is presented. This enables independent flows passing thru the same bottl...
This paper presents first theoretical model of IDPS which combines application tracing and user decisions for building user profiles. This novel idea is based on fact that we have seen nearly all kind of malware since Intrusion Detection System was widely deployed. Our solution presents “deny any” policy as default action. Thus all behavior that we...
We present a probabilistic graphical framework for mobile device positioning. We study the performance of a positioning algorithm, which implements the message-passing paradigm, in an indoor environment where a mobile device measures fingerprints of received signals. The key innovation in our approach is a stochastic parametric model for the finger...
The concept of Reverse Engineering is used in many fields of IT every day, to name just a few: legacy compatibility, binary code patching, malware analysis, network protocols analysis, debugging or even rapid prototyping. Despite its broad use, reverse engineering is not actively taught as a part of computer science courses. This paper tries to pro...
Peer-to-Peer (P2P) currently represents the single largest portion of Internet's traffic. It is well known that the redundancy rate in P2P networks is very high; in fact redundancy is the main concept behind P2P. Th is paper will show how much traffic P2P generates and how much of it is redundant. The popularity distribution in P2P networks will be...
This paper describes the addition of trackerless torrent caching to our existing P2P proxy cache. Trackerless torrents represent the next evolutionary step of the BitTorrent protocol; they eliminate the need for centralized trackers which in fact are the weak point of the whole technology. Further, it will be shown that our approach enables total u...