Sciweavers

7329 search results - page 1254 / 1466
» Network Extractor Protocols
Sort
View
NETWORK
2006
290views more  NETWORK 2006»
15 years 4 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
CN
2002
161views more  CN 2002»
15 years 4 months ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert
CONCURRENCY
2000
83views more  CONCURRENCY 2000»
15 years 4 months ago
Javia: A Java interface to the virtual interface architecture
The Virtual Interface (VI) architecture has become the industry standard for user-level network interfaces. This paper presents the implementation and evaluation of Javia, a Java ...
Chi-Chao Chang, Thorsten von Eicken
JHSN
2002
68views more  JHSN 2002»
15 years 4 months ago
A theory of multi-channel schedulers for quality of service
A computer network consists of a set of computing nodes interconnected via communication channels. It is commonly assumed that, for each pair of network nodes u and v, there is at...
Jorge Arturo Cobb, Miaohua Lin
IWSEC
2010
Springer
15 years 2 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
« Prev « First page 1254 / 1466 Last » Next »