Sciweavers

2715 search results - page 4 / 543
» Network bucket testing
Sort
View
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
15 years 1 months ago
On achievable service differentiation with token bucket marking for TCP
The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service differentiation among flows without any per-flow buffer manage...
Sambit Sahu, Philippe Nain, Christophe Diot, Victo...
INFOCOM
1993
IEEE
15 years 1 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
ICMCS
2005
IEEE
96views Multimedia» more  ICMCS 2005»
15 years 3 months ago
An Elastic Traffic Policer for MPEG Video Streams
Multimedia applications like MPEG-2 video produce packets with multiple levels of importance from application quality point of view. We propose a traffic policing mechanism for s...
Emre Gündüzhan
ECAI
2004
Springer
15 years 3 months ago
Using Constraints with Memory to Implement Variable Elimination
Abstract. Adaptive consistency is a solving algorithm for constraint networks. Its basic step is variable elimination: it takes a network as input, and producesan equivalent networ...
Martí Sánchez, Pedro Meseguer, Javie...
CORR
2008
Springer
118views Education» more  CORR 2008»
14 years 9 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin