— There is growing interest in designing high speed routers with small buffers that store only tens of packets. Recent studies suggest that TCP NewReno, with the addition of a pa...
Yu Gu, Donald F. Towsley, C. V. Hollot, Honggang Z...
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
We consider the medium access control (MAC) layer for very high-speed Wireless LANs, which is designed to support rich multimedia applications such as highdefinition television. ...
Tianji Li, Qiang Ni, David Malone, Douglas J. Leit...
The implementation of bounded-delay services over integrated services networks relies admission control mechanisms that in turn use end-to-end delay computation algorithms. For gu...
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...