Sciweavers

4714 search results - page 352 / 943
» Cognitive Packet Networks
Sort
View
139
Voted
SBCCI
2005
ACM
114views VLSI» more  SBCCI 2005»
15 years 10 months ago
Traffic generation and performance evaluation for mesh-based NoCs
The designer of a system on a chip (SoC) that connects IP cores through a network on chip (NoC) needs methods to support application performance evaluation. Two key aspects these ...
Leonel Tedesco, Aline Mello, Diego Garibotti, Ney ...
116
Voted
FOCS
2003
IEEE
15 years 10 months ago
Instability of FIFO at Arbitrarily Low Rates in the Adversarial Queueing Model
We study the stability of the commonly used packet forwarding protocol, FIFO (First In First Out), in the adversarial queueing model. We prove that FIFO can become unstable, i.e.,...
Rajat Bhattacharjee, Ashish Goel
125
Voted
WSC
2000
15 years 6 months ago
Practical aspects of simulating systems having arrival processes with long-range dependence
Analysis of network traffic indicates that packet arrival processes have significant stochastic dependence. It has been suggested that this dependence is so strong as to be wellmo...
Robert Geist, James Westall
CORR
2008
Springer
153views Education» more  CORR 2008»
15 years 5 months ago
LACK - a VoIP Steganographic Method
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of net...
Wojciech Mazurczyk, Józef Lubacz
135
Voted
IJNSEC
2007
128views more  IJNSEC 2007»
15 years 5 months ago
A Comprehensive Secure VoIP Solution
VoIP represents the future of digital voice communications and many carriers are preparing for the VoIP revolution. However, a number of outstanding issues need to be settled. The...
Ashraf D. Elbayoumy, Simon J. Shepherd