Sciweavers

642 search results - page 96 / 129
» Detecting Spoofed Packets
Sort
View
AINA
2004
IEEE
15 years 8 months ago
RED with Optimized Dynamic Threshold Deployment on Shared Buffer
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, ...
Chengchen Hu, Bin Liu
SIGCOMM
1995
ACM
15 years 8 months ago
Log-Based Receiver-Reliable Multicast for Distributed Interactive Simulation
Reliable multicast communication is important in large-scale distributed applications. For example, reliable multicast is used to transmit terrain and environmental updates in dis...
Hugh W. Holbrook, Sandeep K. Singhal, David R. Che...
SIGCOMM
1995
ACM
15 years 8 months ago
Performance of Checksums and CRCs over Real Data
Checksum and CRC algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of ...
Craig Partridge, James Hughes, Jonathan Stone
FAW
2008
Springer
225views Algorithms» more  FAW 2008»
15 years 6 months ago
Versioning Tree Structures by Path-Merging
We propose path-merging as a refinement of techniques used to make linked data structures partially persistent. Path-merging supports bursts of operations between any two adjacent ...
Khaireel A. Mohamed, Tobias Langner, Thomas Ottman...
CCR
2006
136views more  CCR 2006»
15 years 4 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...