Sciweavers

642 search results - page 92 / 129
» Detecting Spoofed Packets
Sort
View
ISCAPDCS
2001
15 years 6 months ago
Evaluation of Proactive Congestion Control on RED Gateway
In this paper we investigate the network performance of TCP hosts and gateways employing New Reno TCP using a parallel simulator. The gateway adopts the random early detection (RE...
Kuoling Fang, Hee Yong Youn, Hyunseung Choo, Chans...
JSAC
2010
113views more  JSAC 2010»
15 years 3 months ago
On counteracting Byzantine attacks in network coded peer-to-peer networks
Abstract—Random linear network coding can be used in peerto-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are ...
MinJi Kim, Luísa Lima, Fang Zhao, Joã...
ANCS
2009
ACM
15 years 2 months ago
OASis: towards extensible open-architecture services platforms
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...
Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo ...
SENSYS
2010
ACM
15 years 2 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...
SIGMETRICS
2010
ACM
213views Hardware» more  SIGMETRICS 2010»
15 years 9 months ago
Small subset queries and bloom filters using ternary associative memories, with applications
Associative memories offer high levels of parallelism in matching a query against stored entries. We design and analyze an architecture which uses a single lookup into a Ternary C...
Ashish Goel, Pankaj Gupta