Sciweavers

1440 search results - page 278 / 288
» A protocol for packet network intercommunication
Sort
View
CN
1999
116views more  CN 1999»
14 years 11 months ago
Network-conscious GIF image transmission over the Internet
Traditional image compression techniques seek the smallest possible le size for a given level of image quality. By contrast, network-conscious image compression techniques take in...
Paul D. Amer, Sami Iren, Gul E. Sezen, Phillip T. ...
HPCA
2003
IEEE
16 years 2 days ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
ICDCS
2009
IEEE
15 years 9 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
SECURWARE
2007
IEEE
15 years 6 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
EUROGP
2007
Springer
102views Optimization» more  EUROGP 2007»
15 years 5 months ago
Real-Time, Non-intrusive Evaluation of VoIP
Abstract. Speech quality, as perceived by the users of Voice over Internet Protocol (VoIP) telephony, is critically important to the uptake of this service. VoIP quality can be deg...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...