Sciweavers

214 search results - page 10 / 43
» Packet Reordering in Network Processors
Sort
View
83
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Formal Analysis of Passive Measurement Inference Techniques
Abstract— Verifying the accuracy of a passive measurementsbased inference technique under all possible network scenarios is a difficult challenge - the measurement point has lim...
Sharad Jaiswal, Gianluca Iannaccone, James F. Kuro...
TIFS
2008
154views more  TIFS 2008»
14 years 9 months ago
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network...
Juan M. Estévez-Tapiador, Julio Césa...
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 1 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
79
Voted
COMCOM
2007
111views more  COMCOM 2007»
14 years 9 months ago
An argument for simple embedded ACL optimisation
The difficulty of efficiently reordering the rules in an Access Control List is considered and the essential optimisation problem formulated. The complexity of exact and sophistic...
Vic Grout, John Davies, John McGinn
TON
2010
139views more  TON 2010»
14 years 4 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...