Sciweavers

589 search results - page 75 / 118
» internet 2000
Sort
View
SIGCOMM
2000
ACM
15 years 6 months ago
Equation-based congestion control for unicast applications
This paper proposes a mechanism for equation-based congestion control for unicast traffic. Most best-effort traffic in the current Internet is well-served by the dominant transp...
Sally Floyd, Mark Handley, Jitendra Padhye, Jö...
127
Voted
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 5 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
AAAI
2000
15 years 2 months ago
Robust Combinatorial Auction Protocol against False-Name Bids
This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commer...
Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara
ECIS
2000
15 years 2 months ago
Transforming Healthcare in Australia: The PeCC Initiative
Many of the current crises in contemporary healthcare management centre on issues concerning information management and costs. Electronic commerce (or e-commerce) activity, grounde...
Elizabeth More, G. Michael McGrath
NETWORKING
2000
15 years 2 months ago
Network-Driven Layered Multicast with IPv6
Receiver-driven Layered Multicast (RLM) has previously been proposed to distribute video over the best-effort heterogeneous IP networks. Although RLM can avoid network overloading ...
Ho-pong Sze, Soung C. Liew