Sciweavers

1440 search results - page 232 / 288
» A protocol for packet network intercommunication
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
COMCOM
2007
101views more  COMCOM 2007»
15 years 4 months ago
Power control and fairness MAC mechanisms for 802.11 WLANs
Exploiting spatial reuse opportunities will allow more parallel transmissions and improve the throughput of wireless networks. Power control is one of the major mechanisms used to...
Chih-Yung Chang, Hsu-Ruey Chang
CCR
2011
14 years 11 months ago
Two-way TCP connections: old problem, new insight
Many papers explain the drop of download performance when two TCP connections in opposite directions share a common bottleneck link by ACK compression, the phenomenon in which dow...
Martin Heusse, Sears A. Merritt, Timothy X. Brown,...
TON
2010
159views more  TON 2010»
14 years 11 months ago
Googling the internet: profiling internet endpoints via the world wide web
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
ICNS
2009
IEEE
15 years 11 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet