Sciweavers

900 search results - page 102 / 180
» Controlling Inbound Traffic
Sort
View
111
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
ECCV
2008
Springer
16 years 4 months ago
Multi-layered Decomposition of Recurrent Scenes
Abstract. There is considerable interest in techniques capable of identifying anomalies and unusual events in busy outdoor scenes, e.g. road junctions. Many approaches achieve this...
David Mark Russell, Shaogang Gong
117
Voted
HPCA
2009
IEEE
15 years 9 months ago
MRR: Enabling fully adaptive multicast routing for CMP interconnection networks
On-network hardware support for multi-destination traffic is a desirable feature in most multiprocessor machines. Multicast hardware capabilities enable much more effective bandwi...
Pablo Abad Fidalgo, Valentin Puente, José-&...
125
Voted
MSWIM
2005
ACM
15 years 8 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø
152
Voted
DISCEX
2003
IEEE
15 years 7 months ago
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...