Sciweavers

135 search results - page 15 / 27
» Performance Analysis of an RSVP-Capable Router
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 3 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
ISPASS
2005
IEEE
15 years 5 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
ISLPED
2005
ACM
108views Hardware» more  ISLPED 2005»
15 years 5 months ago
Replacing global wires with an on-chip network: a power analysis
This paper explores the power implications of replacing global chip wires with an on-chip network. We optimize network links by varying repeater spacing, link pipelining, and volt...
Seongmoo Heo, Krste Asanovic
GCC
2003
Springer
15 years 5 months ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu
SIGCOMM
2005
ACM
15 years 5 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...