Sciweavers

1815 search results - page 291 / 363
» Path Planning for Network Performance
Sort
View
234
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 9 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
149
Voted
CCS
2005
ACM
15 years 9 months ago
Misbehaving TCP receivers can cause internet-wide congestion collapse
An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack ...
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
ICNP
2003
IEEE
15 years 8 months ago
The Impact of False Sharing on Shared Congestion Management
Several recent proposals for sharing congestion information across concurrent flows between end-systems overlook an important problem: two or more flows sharing congestion state...
Aditya Akella, Srinivasan Seshan, Hari Balakrishna...
143
Voted
CAMAD
2006
IEEE
15 years 7 months ago
Enhancing reliable multicast transport to mitigate the impact of blockage
Mobile wireless communication is susceptible to signal blockage, which is loss of signal, typically due to physical obstruction, over a longer duration relative to fading. Measurem...
Stephen F. Bush, Orhan C. Imer, Praveen Kumar Gopa...
136
Voted
DAC
2005
ACM
15 years 5 months ago
Modular domain-specific implementation and exploration framework for embedded software platforms
This paper focuses on designing network processing software for embedded processors. Our design flow CRACC represents an efficient path to implementation based on a modular applic...
Christian Sauer, Matthias Gries, Sören Sonnta...