Sciweavers

4262 search results - page 817 / 853
» Internet and Intranet Computing
Sort
View
IMC
2006
ACM
15 years 8 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
MOBICOM
2006
ACM
15 years 8 months ago
A coordinate-based approach for exploiting temporal-spatial diversity in wireless mesh networks
In this paper, we consider the problem of mitigating interference and improving network capacity in wireless mesh networks from the angle of temporal-spatial diversity. In a nutsh...
Hyuk Lim, Chaegwon Lim, Jennifer C. Hou
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 8 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
W4A
2006
ACM
15 years 8 months ago
Transforming web pages to become standard-compliant through reverse engineering
Developing Web pages following established standards can make the information more accessible, their rendering more efficient, and their processing by computer applications easier...
Benfeng Chen, Vincent Y. Shen
BROADNETS
2005
IEEE
15 years 7 months ago
Bandwidth guaranteed multicast scheduling for virtual output queued packet switches
Multicast enables efficient data transmission from one source to multiple destinations, and has been playing an important role in Internet multimedia applications. Although sever...
Deng Pan, Yuanyuan Yang