Sciweavers

338 search results - page 3 / 68
» A 50-Gb s IP router
Sort
View
CCS
2000
ACM
13 years 10 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
CODES
2007
IEEE
14 years 18 days ago
Performance and resource optimization of NoC router architecture for master and slave IP cores
System-on-Chip architectures incorporate several IP cores with well defined master and slave characteristics in terms of on-chip communication. The paper presents a parameterized ...
Glenn Leary, Krishna Mehta, Karam S. Chatha
DAC
2005
ACM
13 years 8 months ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga
ICNP
2006
IEEE
14 years 8 days ago
Scaling IP Routing with the Core Router-Integrated Overlay
— IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switchin...
Xinyang Zhang, Paul Francis, Jia Wang, Kaoru Yoshi...
WEA
2005
Springer
120views Algorithms» more  WEA 2005»
13 years 11 months ago
Distilling Router Data Analysis for Faster and Simpler Dynamic IP Lookup Algorithms
Abstract. We consider the problem of fast IP address lookup in the forwarding engines of Internet routers. We analyze over 2400 public snapshots of routing tables collected over ï¬...
Filippo Geraci, Roberto Grossi