Sciweavers

3134 search results - page 293 / 627
» Computing full disjunctions
Sort
View
IPPS
2005
IEEE
15 years 8 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Vasilios A. Siris, Ilias Stavrakis
IPPS
2005
IEEE
15 years 8 months ago
To Unify Structured and Unstructured P2P Systems
Most of current peer-to-peer designs build their own system overlays independent of the physical one. Nodes within unstructured systems form a random overlay, on the contrary, str...
Honghao Wang, Yingwu Zhu, Yiming Hu
ISCAS
2005
IEEE
124views Hardware» more  ISCAS 2005»
15 years 8 months ago
One-pass computation-aware motion estimation with adaptive search strategy
— A computation-aware motion estimation algorithm is proposed in this paper. Its goal is to find the best block matching results in a computation-limited and computation-variant...
Yu-Wen Huang, Chia-Lin Lee, Ching-Yeh Chen, Liang-...
QSIC
2005
IEEE
15 years 8 months ago
A Service Workflow Management Framework Based on Peer-to-Peer and Agent Technologies
Service workflow management which consolidates multiple services to achieve business goals has become a critical issue in service-oriented computing. Due to the unique feature of ...
Jun Yan, Yun Yang, Ryszard Kowalczyk, Xuan Thang N...
ANCS
2005
ACM
15 years 8 months ago
A novel reconfigurable hardware architecture for IP address lookup
IP address lookup is one of the most challenging problems of Internet routers. In this paper, an IP lookup rate of 263 Mlps (Million lookups per second) is achieved using a novel ...
Hamid Fadishei, Morteza Saheb Zamani, Masoud Sabae...