Sciweavers

4581 search results - page 844 / 917
» Distributed optimization in sensor networks
Sort
View
WIOPT
2006
IEEE
15 years 11 months ago
Online association policies in IEEE 802.11 WLANs
Abstract— In this paper, we study the performance of clientAccess Point (AP) association policies in IEEE 802.11 based WLANs. In many scenarios, clients have a choice of APs with...
Gaurav Kasbekar, Joy Kuri, Pavan Nuggehalli
171
Voted
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
142
Voted
INFOCOM
2005
IEEE
15 years 10 months ago
On the effectiveness of DDoS attacks on statistical filtering
— Distributed Denial of Service (DDoS) attacks pose a serious threat to service availability of the victim network by severely degrading its performance. Recently, there has been...
Qiming Li, Ee-Chien Chang, Mun Choon Chan
CONEXT
2007
ACM
15 years 9 months ago
Router buffer sizing revisited: the role of the output/input capacity ratio
The issue of router buffer sizing is still open and significant. Previous work either considers open-loop traffic or only analyzes persistent TCP flows. This paper differs in two ...
Ravi S. Prasad, Constantine Dovrolis, Marina Thott...
NETWORKS
2008
15 years 5 months ago
New dynamic programming algorithms for the resource constrained elementary shortest path problem
The resource-constrained elementary shortest path problem arises as a pricing subproblem in branch-and-price algorithms for vehicle routing problems with additional constraints. W...
Giovanni Righini, Matteo Salani