Sciweavers

1144 search results - page 158 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
ISPASS
2009
IEEE
15 years 6 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
PE
2002
Springer
128views Optimization» more  PE 2002»
14 years 10 months ago
Response times in a two-node queueing network with feedback
The study presented in this paper is motivated by the performance analysis of response times in distributed information systems, where transactions are handled by iterative server...
Robert D. van der Mei, Bart Gijsen, N. in't Veld, ...
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
15 years 3 months ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 4 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
WWIC
2009
Springer
191views Communications» more  WWIC 2009»
15 years 5 months ago
Hop-to-Hop Reliability in IP-Based Wireless Sensor Networks - A Cross-Layer Approach
Abstract. To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer desi...
Gerald Wagenknecht, Markus Anwander, Torsten Braun