Sciweavers

503 search results - page 50 / 101
» IP Queuing Analysis
Sort
View
INFOCOM
2000
IEEE
15 years 3 months ago
Competitive Queue Policies for Differentiated Services
We consider the setting of a network providing differentiated services. As is often the case in differentiated services, we assume that the packets are tagged as either being a hi...
William Aiello, Yishay Mansour, S. Rajagopolan, Ad...
HIPC
2009
Springer
14 years 9 months ago
Impact of early abort mechanisms on lock-based software transactional memory
Software transactional memory (STM) is an emerging concurrency control mechanism for shared memory accesses. Early abort is one of the important techniques to improve the executio...
Zhengyu He, Bo Hong
JDCTA
2010
172views more  JDCTA 2010»
14 years 6 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
CCS
2007
ACM
15 years 6 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
DSS
2008
122views more  DSS 2008»
14 years 12 months ago
Weblogging: A study of social computing and its impact on organizations
This article reviews weblogs and their role as a social networking device for young people and its probable evolution to the organizational computing medium. The motivation of you...
Rachael Kwai Fun Ip, Christian Wagner