Sciweavers

894 search results - page 138 / 179
» Internet Routing
Sort
View
IJSN
2007
73views more  IJSN 2007»
14 years 11 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
14 years 10 months ago
Protocol Wrappers for Layered Network Packet Processing in Reconfigurable Hardware
abstracting the operation of lower-level packet processing functions. The library synthesizes into field-programmable gate array (FPGA) logic and is utilized in a network platform ...
Florian Braun, John W. Lockwood, Marcel Waldvogel
OTM
2010
Springer
14 years 9 months ago
A Metamodel for Master Data
Abstract. The term ‘Master Data’ brings up different interpretations and connotations, especially with vendors espousing the “single version of the truth”. Is there a singl...
Baba Piprani, Suneil Dham
WICON
2010
14 years 8 months ago
Optimized Content Caching and Request Capture in CNF Networks
In order to meet the overwhelming demands of content retrieval for mobile end users, a novel architecture for the next-generation Internet called Cache-and-Forward (CNF) has been p...
Lijun Dong, Dan Zhang, Yanyong Zhang, Dipankar Ray...
JCIT
2010
197views more  JCIT 2010»
14 years 5 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour