Sciweavers

184 search results - page 12 / 37
» Active Virtual Network Management Protocol
Sort
View
ICNC
2005
Springer
15 years 8 months ago
An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending
In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and...
Álvaro Herrero, Emilio Corchado, José...
113
Voted
ISCA
2008
IEEE
125views Hardware» more  ISCA 2008»
15 years 9 months ago
Virtual Circuit Tree Multicasting: A Case for On-Chip Hardware Multicast Support
Current state-of-the-art on-chip networks provide efficiency, high throughput, and low latency for one-to-one (unicast) traffic. The presence of one-to-many (multicast) or one-t...
Natalie D. Enright Jerger, Li-Shiuan Peh, Mikko H....
132
Voted
AIMS
2008
Springer
15 years 9 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
112
Voted
MDM
2004
Springer
15 years 7 months ago
Multi-Protocol Profiles to Support User Mobility Across Network Technologies
Seamless roaming in heterogeneous circuit-switched and IP networks is key for successful migration towards all-IP. The Unified Mobility Manager (UMM) keeps track of users’ locat...
Oliver Haase, Ming Xiong, Kazutaka Murakami
160
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 9 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar