Learn More
The Internet and the proliferation of inexpensive computing power in the form of clusters of workstations or PCs provide the basic hardware infrastructure for business to business electronic commerce in small and medium enterprises. Unfortunately, the corresponding software infrastructure is still missing. In this paper we show a way to develop appropriate(More)
The security level of networks and systems is determined by the software vulnerabilities of its elements. Defending against large scale attacks requires a quantitative understanding of the vulnerability lifecycle. Specifically, one has to understand how exploitation and remediation of vulnerabilities, as well as the distribution of information thereof is(More)
Simulations with web traffic usually generate input by sampling a heavy-tailed object size distribution. As a consequence these simulations remain in transient state over all periods of time, i.e. all statistics that depend on moments of this distribution, such as the average object size or the average user-perceived latency of downloads, do not converge(More)
One of the key invariants in computer and communication systems is that im¬ portant characteristics follow long-or heavy-tailed distributions. This means that the tail of these distributions declines according to a power law. Hence, the probability for extremely large values is non-negligible. For example, such distributions have been found to describe the(More)
Deployment of Gigabit Ethernets in metropolitan areas creates new opportunities to save costs by converging data and telephone services. The primary question of our study is whether emerging metropolitan networks can meet the QoS requirements necessary to connect GSM and UMTS base stations. These requirements on delay, jitter, and loss are significantly(More)
The precise, sequence-specific regulation of RNA synthesis is the primary mechanism underlying differential gene expression. This general statement applies to both prokaryotic and eukaryotic organisms, as well as to their viral pathogens. Thus, it is not surprising that genomes use a substantial portion of their protein-coding content to regulate the(More)