Sciweavers

1951 search results - page 327 / 391
» An Architecture for Network Resource Monitoring in a Distrib...
Sort
View
SIGCOMM
2005
ACM
14 years 2 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
ACSAC
2010
IEEE
13 years 22 days ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
ICDCS
2000
IEEE
14 years 1 months ago
Scalable QoS Guaranteed Communication Services for Real-Time Applications
In this paper, we propose an approach to flow-unaware admission control, which is combination with an aggregate packet forwarding scheme, improves scalability of networks while g...
Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo B...
KIVS
2005
Springer
14 years 2 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
TPDS
2010
159views more  TPDS 2010»
13 years 7 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim