Sciweavers

1272 search results - page 58 / 255
» Blocking in All-Optical Networks
Sort
View
ANSS
2008
IEEE
15 years 4 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
HOTI
2008
IEEE
15 years 4 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
EPEW
2007
Springer
15 years 4 months ago
Towards an Automatic Modeling Tool for Observed System Behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of capa...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 4 months ago
Analytical Tool to Achieve Wavelength Conversion Performance in No Wavelength Conversion Optical WDM Networks
— We present an analytical tool to enhance the blocking performance in the circuit-switched wide-area optical wavelength division multiplexed (WDM) networks with no wavelength co...
Pachamuthu Rajalakshmi, Ashok Jhunjhunwala
BROADNETS
2005
IEEE
15 years 3 months ago
Wireless enhancements for storage area networks
— We propose the creation of a wireless storage area network (SAN) and analyze its benefits. The proposed wireless SAN (WSAN) consists of a SAN switch that is connected to multi...
David W. Griffith, Kotikalapudi Sriram, JingSi Gao...