Sciweavers

4714 search results - page 107 / 943
» Cognitive Packet Networks
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 10 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
LCN
2002
IEEE
15 years 8 months ago
Reliable Group Communication in an Ad Hoc Network
In this paper an enhancement to the reliability of the ODMRP multicast ad hoc protocol is described. The enhancement attempts to increase the overall data packet delivery ratio by...
Lawrence Klos, Golden G. Richard III
ICIP
2002
IEEE
16 years 5 months ago
Protocols for distributed video streaming
With the explosive growth of video applications over the Internet, many approaches have been proposed to stream video effectively over packet switched, best-effort networks. In ou...
Thinh P. Q. Nguyen, Avideh Zakhor
96
Voted
JIPS
2006
59views more  JIPS 2006»
15 years 3 months ago
A Light-weight and Dynamically Reconfigurable RMON Agent System
: A RMON agent system, which locates on a subnet, collects the network traffic information for management by retrieving and analyzing all of the packets on the subnet. The RMON age...
Jun-Hyung Lee, Zinwon Park, Myung-Kyun Kim
144
Voted
ANCS
2007
ACM
15 years 7 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos