Sciweavers

1639 search results - page 136 / 328
» Degree-constrained network flows
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
SIAMAM
2008
91views more  SIAMAM 2008»
15 years 4 months ago
A Fluid Dynamic Model for Telecommunication Networks with Sources and Destinations
This paper proposes a macroscopic fluid dynamic model dealing with the flows of information on a telecommunication network with sources and destinations. The model consists of a co...
Ciro D'Apice, Rosanna Manzo, Benedetto Piccoli
DSOM
2003
Springer
15 years 9 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
LCN
2000
IEEE
15 years 8 months ago
Intra-domain Bandwidth Management in Differentiated Services Network
In absence of any link layer traffic controls or priorityqueuing mechanism in LAN infrastructure (such as shared media LAN), Subnet Bandwidth Management based approach of managing...
Sanjay Jha, Mahbub Hassan, Priyadarsi Nanda, Nadee...
RSP
2000
IEEE
100views Control Systems» more  RSP 2000»
15 years 8 months ago
A Hardware Virtual Machine for the Networked Reconfiguration
Networked reconfiguration is an enabling technology for cost effective service deployment and maintenance. A hardware virtual machine to enable this networked reconfigurapresented...
Yajun Ha, Patrick Schaumont, Marc Engels, Serge Ve...