Sciweavers

1170 search results - page 163 / 234
» How Fast Is Too Fast
Sort
View
WIOPT
2006
IEEE
15 years 9 months ago
Analyzing the impact of neighbor sensing on the performance of the OLSR protocol
— This paper presents an analysis of several neighbor sensing approaches for the OLSR routing protocol. While several performance studies of OLSR proceed this work, few attention...
Michael Voorhaen, Chris Blondia
INFOSCALE
2006
ACM
15 years 9 months ago
A generic search strategy for large-scale real-world networks
— We consider the following situation for a given large-scale network: Starting from an initial node we move to its neighbor node and repeat that until reaching a target node. Ho...
Yuichi Kurumida, Tsukasa Ogata, Hirotaka Ono, Kuni...
HOTI
2005
IEEE
15 years 8 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
ICCV
2005
IEEE
15 years 8 months ago
Fusing Points and Lines for High Performance Tracking
This paper addresses the problem of real-time 3D modelbased tracking by combining point-based and edge-based tracking systems. We present a careful analysis of the properties of t...
Edward Rosten, Tom Drummond
INFOCOM
2005
IEEE
15 years 8 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...