Sciweavers

7329 search results - page 1278 / 1466
» Network Extractor Protocols
Sort
View
ATC
2006
Springer
15 years 7 months ago
TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System
Multimedia streaming application is increasingly popular. P2P mode makes it much more suitable for large-scale users to participate into one single application. However, most effor...
Sirui Yang, Hai Jin, Xuping Tu
DATE
2004
IEEE
134views Hardware» more  DATE 2004»
15 years 7 months ago
Application of a Multi-Processor SoC Platform to High-Speed Packet Forwarding
In this paper, we explore the requirements of emerging complex SoC's and describe StepNP, an experimental flexible, multi-processor SoC platform targeted towards communicatio...
Pierre G. Paulin, Chuck Pilkington, Essaid Bensoud...
ACSAC
2001
IEEE
15 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ASPDAC
2001
ACM
112views Hardware» more  ASPDAC 2001»
15 years 7 months ago
Parameterized MAC unit implementation
Ethernet communication devices, such as adapter, hub, bridge and switch, all follow IEEE 802.3 standard protocol. We have designed and implemented an integrated 10/100 Mbps Etherne...
Ming-Chih Chen, Ing-Jer Huang, Chung-Ho Chen
ACSAC
1997
IEEE
15 years 7 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung
« Prev « First page 1278 / 1466 Last » Next »