Sciweavers

455 search results - page 85 / 91
» Tradeoffs for Packet Classification
Sort
View
CCGRID
2001
IEEE
15 years 4 months ago
An Adaptive, Reconfigurable Interconnect for Computational Clusters
This paper describes the principles of an original adaptive interconnect for a computational cluster. Torus topology (2d or 3d) is used as a basis but nodes are allowed to effecti...
Alexander V. Shafarenko, Vladimir Vasekin
USS
2004
15 years 2 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
CN
2008
106views more  CN 2008»
15 years 1 months ago
Efficient virtual-backbone routing in mobile ad hoc networks
Since the physical topology of Mobile Ad hoc Networks (MANETs) is generally unstable, an appealing approach is the construction of a stable and robust virtual topology or backbone...
Jamal N. Al-Karaki, Ahmed E. Kamal
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 1 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
CORR
2007
Springer
114views Education» more  CORR 2007»
15 years 1 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...