The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For the situation of exponential holding times an explicit analysis can be performed in a large-deviations regime, leading to approximations of the test statistic of interest (and, in addition, to results for the transient of the M/M/∞ queue, which are of independent interest). This procedure being applicable to exponential holding times only, and also being numerically rather involved, we then develop an approximate procedure for general holding tim...
In this study, the characteristics of VoIP traffic in a deployed Cisco VoIP phone system and a SIP b...
In the paper, we present a procedure to evaluate the parameters of the LEAP (Linear Bounded A-rival ...
Change detection schemes are used in numerous applications, ranging from industrial quality control ...
When controlling communication networks, it is of crucial importance to have procedures that are cap...
When controlling communication networks, it is of crucial importance to have procedures that are cap...
The control of communication networks critically relies on procedures capable of detecting unanticip...
When controlling communication networks, it is of crucial importance to have procedures that are cap...
The control of communication networks critically relies on procedures capable of detecting unanticip...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
The main task of network administrators is to ensure that their network functions properly. Whether ...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...
Statistical distributions are used to model behaviour of real VoIP traffic. We investigate call hold...
In this study, the characteristics of VoIP traffic in a deployed Cisco VoIP phone system and a SIP b...
In the paper, we present a procedure to evaluate the parameters of the LEAP (Linear Bounded A-rival ...
Change detection schemes are used in numerous applications, ranging from industrial quality control ...
When controlling communication networks, it is of crucial importance to have procedures that are cap...
When controlling communication networks, it is of crucial importance to have procedures that are cap...
The control of communication networks critically relies on procedures capable of detecting unanticip...
When controlling communication networks, it is of crucial importance to have procedures that are cap...
The control of communication networks critically relies on procedures capable of detecting unanticip...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Abstract—In this paper we present methodological advances in anomaly detection, which, among other p...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
The main task of network administrators is to ensure that their network functions properly. Whether ...
VoIP applications allow us fast and cheap communication over the internet. Due to the massive expans...
Statistical distributions are used to model behaviour of real VoIP traffic. We investigate call hold...
In this study, the characteristics of VoIP traffic in a deployed Cisco VoIP phone system and a SIP b...
In the paper, we present a procedure to evaluate the parameters of the LEAP (Linear Bounded A-rival ...
Change detection schemes are used in numerous applications, ranging from industrial quality control ...