Sciweavers

3116 search results - page 94 / 624
» Design and implementation of network puzzles
Sort
View
ICNP
2007
IEEE
15 years 6 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
IFIP
2010
Springer
15 years 3 months ago
Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation
Abstract Flow Accounting is a passive monitoring mechanism implemented in routers that gives insight into trac behavior and network characteristics. However, processing of Flow Ac...
Jochen Kögel, Sebastian Scholz
PERCOM
2004
ACM
15 years 11 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
INFOCOM
2009
IEEE
15 years 6 months ago
muNet: Harnessing Multiuser Capacity in Wireless Mesh Networks
— We present muNet, a wireless mesh network design and implementation to harness the multiuser capacity of wireless channels. Traditionally, media access control is designed to s...
Li Li, Richard Alimi, Ramachandran Ramjee, Harish ...
DATE
2007
IEEE
133views Hardware» more  DATE 2007»
15 years 6 months ago
Butterfly and benes-based on-chip communication networks for multiprocessor turbo decoding
Several research activities have recently emerged aiming to propose multiprocessor implementations in order to achieve flexible and high throughput parallel iterative decoding. Be...
Hazem Moussa, Olivier Muller, Amer Baghdadi, Miche...