Sciweavers

1639 search results - page 233 / 328
» Degree-constrained network flows
Sort
View
107
Voted
CEEMAS
2007
Springer
15 years 6 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
113
Voted
HPCC
2007
Springer
15 years 6 months ago
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks
Due to dense deployment and innumerable amount of traffic flow in wireless sensor networks (WSNs), congestion becomes more common phenomenon from simple periodic traffic to unpredi...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
86
Voted
CODES
2005
IEEE
15 years 6 months ago
FlexPath NP: a network processor concept with application-driven flexible processing paths
In this paper, we present a new architectural concept for network processors called FlexPath NP. The central idea behind FlexPath NP is to systematically map network processor (NP...
Rainer Ohlendorf, Andreas Herkersdorf, Thomas Wild
97
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Secure Communications in ATM Networks
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
ICWN
2004
15 years 2 months ago
RED for Improving TCP over Wireless Networks
TCP was designed and tuned to work well on networks where losses are mainly congestion losses. The performance of TCP decreases dramatically when a TCP connection traverses a wire...
Saad Biaz, Xia Wang