Sciweavers

107 search results - page 20 / 22
» Fair Scheduling in Internet Routers
Sort
View
IMC
2004
ACM
15 years 5 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
JSAC
2006
146views more  JSAC 2006»
14 years 11 months ago
Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks
Multihop infrastructure wireless mesh networks offer increased reliability, coverage, and reduced equipment costs over their single-hop counterpart, wireless local area networks. E...
Mansoor Alicherry, Randeep Bhatia, Erran L. Li
ISORC
2000
IEEE
15 years 4 months ago
TCP Throughput and Buffer Management
There have been many debates about the feasibility of providing guaranteed Quality of Service (QoS) when network traffic travels beyond the enterprise domain and into the vast unk...
Todd Lizambri, Fernando Duran, Shukri Wakid
88
Voted
LISA
2000
15 years 1 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
GLOBECOM
2009
IEEE
15 years 3 months ago
Efficient Multicast Support in Buffered Crossbars using Networks on Chip
The Internet growth coupled with the variety of its services is creating an increasing need for multicast traffic support by backbone routers and packet switches. Recently, buffere...
Iria Varela Senin, Lotfi Mhamdi, Kees Goossens