Sciweavers

642 search results - page 69 / 129
» Detecting Spoofed Packets
Sort
View
127
Voted
ARC
2010
Springer
186views Hardware» more  ARC 2010»
15 years 8 months ago
Application-Specific Signatures for Transactional Memory in Soft Processors
As reconfigurable computing hardware and in particular FPGA-based systems-on-chip comprise an increasing number of processor and accelerator cores, supporting sharing and synchroni...
Martin Labrecque, Mark Jeffrey, J. Gregory Steffan
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 11 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
142
Voted
IMC
2004
ACM
15 years 10 months ago
MultiQ: automated detection of multiple bottleneck capacities along a path
multiQ is a passive capacity measurement tool suitable for largescale studies of Internet path characteristics. It is the first passive tool that discovers the capacity of multip...
Sachin Katti, Dina Katabi, Charles Blake, Eddie Ko...
ICC
2009
IEEE
138views Communications» more  ICC 2009»
15 years 11 months ago
Iterative Detection and Decoding for Hard-Decision Forwarding Aided Cooperative Spatial Multiplexing
— In this paper, 1 the optimal decoding strategy for cooperative spatial multiplexing (CSM) aided systems is derived. In CSM systems, the multiple relay stations (RSs), which com...
Kyungchun Lee, Lajos Hanzo
139
Voted
ICNP
2007
IEEE
15 years 11 months ago
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations
— TCP is the dominant transport protocol used in the Internet and its performance fundamentally governs the performance of Internet applications. It is well-known that packet los...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith