Sciweavers

1497 search results - page 282 / 300
» A Computational Model for Message Passing
Sort
View
PIMRC
2008
IEEE
14 years 2 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
ADHOCNOW
2008
Springer
14 years 2 months ago
Request Satisfaction Problem in Synchronous Radio Networks
We study two algorithmical problems inspired from routing constraints in a multihop synchronous radio network. Our objective is to satisfy a given set of communication requests in ...
Benoît Darties, Sylvain Durand, Jér&o...
IEEECIT
2007
IEEE
14 years 2 months ago
Overview of LDPC Codes
In light of the history of LDPC codes and relevant research advances in recent years, this paper probes into the encoding and decoding techniques related to this capacity-approach...
Zongjie Tu, Shiyong Zhang
P2P
2007
IEEE
14 years 2 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
BROADNETS
2006
IEEE
14 years 1 months ago
SLIP-IN Architecture: A new Hybrid Optical Switching Scheme
— In this paper, we present a new hybrid switching architecture, termed as SLIP-IN, that combines electronic packet/burst with optical circuit switching. SLIP-IN architecture tak...
Kostas Ramantas, Kostas Christodoulopoulos, Kyriak...