Sciweavers

642 search results - page 95 / 129
» Detecting Spoofed Packets
Sort
View
ISMVL
2010
IEEE
164views Hardware» more  ISMVL 2010»
15 years 9 months ago
On the Number of Products to Represent Interval Functions by SOPs with Four-Valued Variables
Abstract—Let A and B be integers such that A ≤ B. An nvariable interval function is a mapping IN[n : A, B] : {0, 1}n → {0, 1}, where IN[n : A, B](X) = 1 iff A ≤ X ≤ B. Su...
Tsutomu Sasao
VISUALIZATION
2002
IEEE
15 years 9 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...
151
Voted
INFOCOM
2000
IEEE
15 years 9 months ago
Scalable TCP Congestion Control
— The packet losses imposed by IP networks can cause long and erratic recovery delays, since senders must often use conservative loss detection and retransmission mechanisms. Thi...
Robert Morris
INFOCOM
2000
IEEE
15 years 9 months ago
Scalable, Low-Overhead Network Delay Estimation
Estimating the network delays between each pair of nodes in a multicast session is the key parameter in reliable multicast; it is used, among other things, in suppressing the impl...
Volkan Ozdemir, S. Muthukrishnan, Injong Rhee
SIGCOMM
2000
ACM
15 years 9 months ago
A stochastic model of TCP/IP with stationary random
In this paper, we present a model for TCP/IP ow control mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At that point,...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...