Sciweavers

3483 search results - page 543 / 697
» Forward
Sort
View
145
Voted
CCR
2004
153views more  CCR 2004»
15 years 3 months ago
Tree bitmap: hardware/software IP lookups with incremental updates
IP address lookup is challenging for high performance routers because it requires a longest matching prefix at speeds of up to 10 Gbps (OC-192). Existing solutions have poor updat...
Will Eatherton, George Varghese, Zubin Dittia
147
Voted
CN
2004
149views more  CN 2004»
15 years 3 months ago
Efficient dynamic traffic grooming in service-differentiated WDM mesh networks
In this paper, we address the issue of traffic grooming in arbitrary WDM mesh networks. We present a novel groomer architecture wherein a combination of grooming at two different ...
Harsha V. Madhyastha, C. Siva Ram Murthy
111
Voted
CROSSROADS
2004
108views more  CROSSROADS 2004»
15 years 3 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
117
Voted
AIL
2000
78views more  AIL 2000»
15 years 3 months ago
Representation of formal dispute with a standing order
Computational dialectics is a relatively new field. It is, among others, concerned with the formal representation of argument and dispute. The goal is to suggest algorithms, proce...
Gerard Vreeswijk
117
Voted
AIS
2000
Springer
15 years 3 months ago
Early-connectionism machines
: In this paper I put forward a reconstruction of the evolution of certain explanatory hypotheses on the neural basis of association and learning that are the premises of connectio...
Roberto Cordeschi