Sciweavers

1080 search results - page 124 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
DDECS
2009
IEEE
171views Hardware» more  DDECS 2009»
15 years 4 months ago
Packet header analysis and field extraction for multigigabit networks
—Packet header analysis and extraction of header fields needs to be performed in all network devices. As network speed is increasing quickly, high speed packet header processing...
Petr Kobierský, Jan Korenek, Libor Polcak
DSOM
2003
Springer
15 years 3 months ago
A Method on Multimedia Service Traffic Monitoring and Analysis
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on netw...
Hun-Jeong Kang, Myung-Sup Kim, James Won-Ki Hong
INFOCOM
2005
IEEE
15 years 3 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...
ICNP
2002
IEEE
15 years 2 months ago
Analysis of the MED Oscillation Problem in BGP
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement “cold potato routing” between autonomous systems. However, the us...
Timothy Griffin, Gordon T. Wilfong
SIAMCOMP
2002
113views more  SIAMCOMP 2002»
14 years 9 months ago
A Layered Analysis of Consensus
This paper introduces a simple notion of layering as a tool for analyzing well-behaved runs of a given model of distributed computation. Using layering, a model-independent analysi...
Yoram Moses, Sergio Rajsbaum