Sciweavers

100 search results - page 18 / 20
» In-packet Bloom filters: Design and networking applications
Sort
View
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 6 months ago
Real-Time Multi-path Tracking of Probabilistic Available Bandwidth
Applications such as traffic engineering and network provisioning can greatly benefit from knowing, in real time, what is the largest input rate at which it is possible to transmit...
Frederic Thouin, Mark Coates, Michael Rabbat
ANCS
2009
ACM
13 years 4 months ago
Progressive hashing for packet processing using set associative memory
As the Internet grows, both the number of rules in packet filtering databases and the number of prefixes in IP lookup tables inside the router are growing. The packet processing e...
Michel Hanna, Socrates Demetriades, Sangyeun Cho, ...
DEBS
2008
ACM
13 years 8 months ago
Speculative out-of-order event processing with software transaction memory
In event stream applications, events flow through a network of components that perform various types of operations, e.g., filtering, aggregation, transformation. When the operatio...
Andrey Brito, Christof Fetzer, Heiko Sturzrehm, Pa...
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 6 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
ACSAC
2008
IEEE
14 years 23 days ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh