Sciweavers

642 search results - page 32 / 129
» Detecting Spoofed Packets
Sort
View
IPPS
1999
IEEE
15 years 6 months ago
Randomized Initialization Protocols for Packet Radio Networks
The main contribution of this work is to propose efficient randomized leader election and initialization protocols for Packet Radio Networks (PRN, for short). As a result of the i...
Tatsuya Hayashi, Koji Nakano, Stephan Olariu
IAJIT
2008
151views more  IAJIT 2008»
15 years 2 months ago
Analysis Of Epileptic Events Using Wavelet Packets
: Many studies have focused on the nonlinear analysis of electroencephalography mainly for the characterization of epileptic brain states. The spatial and temporal dynamics of the ...
Nisrine Sinno, Kifah Tout
GLOBECOM
2010
IEEE
14 years 12 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
ICIP
2002
IEEE
16 years 3 months ago
An improved error control paradigm for multimedia transmission over wireless networks
Providing quality-of-service (QoS) guarantees over wireless packet networks requires thorough understanding and quantification of the interactions among the traffic source, the wi...
Mohamed F. Mansour, Abed Elhamid Lawabni, Ahmed H....
IPCCC
2005
IEEE
15 years 7 months ago
A tree-based reliable multicast scheme exploiting the temporal locality of transmission errors
Tree-based reliable multicast protocols provide scalability by distributing error-recovery tasks among several repair nodes. These repair nodes keep in their buffers all packets t...
Jinsuk Baek, Jehan-François Pâris