Sciweavers

954 search results - page 111 / 191
» A Modular Approach to Packet Classification: Algorithms and ...
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 9 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
ICCV
1999
IEEE
14 years 11 months ago
Control in a 3D Reconstruction System using Selective Perception
This paper presents a control structure for general purpose image understanding that addresses both the high level of uncertainty in local hypotheses and the computational complex...
Maurício Marengoni, Allen R. Hanson, Shlomo...
WICON
2008
13 years 10 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
COMCOM
1998
102views more  COMCOM 1998»
13 years 8 months ago
Preferred link based delay-constrained least-cost routing in wide area networks
Multimedia applications involving digital audio and/or digital video transmissions require strict QoS constraints (end-to-end delay bound, bandwidth availability, packet loss rate...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
TMM
2010
151views Management» more  TMM 2010»
13 years 3 months ago
SPANC: Optimizing Scheduling Delay for Peer-to-Peer Live Streaming
Abstract--In peer-to-peer (P2P) live streaming using unstructured mesh, packet scheduling is an important factor in overall playback delay. In this paper, we propose a scheduling a...
Tammy Kam-Hung Chan, Shueng-Han Gary Chan, Ali C. ...