Sciweavers

1377 search results - page 192 / 276
» Flit-Reservation Flow Control
Sort
View
NSPW
2006
ACM
15 years 10 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
ICETE
2004
253views Business» more  ICETE 2004»
15 years 5 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
SIGCOMM
2010
ACM
15 years 4 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser
GLOBECOM
2006
IEEE
15 years 10 months ago
End-to-end Congestion Management for Real-Time Streaming Video over the Internet
– In this paper, we propose a new transport protocol, namely Scalable Streaming Video Protocol (SSVP), which employs an AIMD-oriented congestion control mechanism. SSVP, in a com...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
HOTOS
1999
IEEE
15 years 8 months ago
The Case for Informed Transport Protocols
Wide-area distributed applications are frequently limited by the performance of Internet data transfer. We argue that the principle cause of this effect is the poor interaction be...
Stefan Savage, Neal Cardwell, Thomas E. Anderson