Sciweavers

7329 search results - page 348 / 1466
» Network Extractor Protocols
Sort
View
PRDC
2007
IEEE
15 years 11 months ago
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also ...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
INFOCOM
2003
IEEE
15 years 10 months ago
An approach to alleviate link overload as observed on an IP backbone
Abstract -- Shortest path routing protocols may suffer from congestion due to the use of a single shortest path between a source and a destination. The goal of our work is to first...
Sundar Iyer, Supratik Bhattacharyya, Nina Taft, Ch...
CASCON
2006
149views Education» more  CASCON 2006»
15 years 6 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
SIGOPS
2008
162views more  SIGOPS 2008»
15 years 4 months ago
CUBIC: a new TCP-friendly high-speed TCP variant
CUBIC is a congestion control protocol for TCP (transmission control protocol) and the current default TCP algorithm in Linux. The protocol modifies the linear window growth funct...
Sangtae Ha, Injong Rhee, Lisong Xu
NETWORK
2008
100views more  NETWORK 2008»
15 years 4 months ago
Distributed connectivity service for a SIP infrastructure
Because of the constant reduction of available public network addresses and the necessity to secure networks, devices like Network Address Translators and firewalls have become qui...
Luigi Ciminiera, Guido Marchetto, Fulvio Risso, Li...