Sciweavers

1639 search results - page 317 / 328
» Degree-constrained network flows
Sort
View
AINA
2010
IEEE
14 years 2 months ago
Grid of Segment Trees for Packet Classification
—Packet classification problem has received much attention and continued to be an important topic in recent years. In packet classification problem, each incoming packet should b...
Yeim-Kuan Chang, Yung-Chieh Lin, Chen-Yu Lin
INFOCOM
2000
IEEE
14 years 2 months ago
Experimental QoS Performances of Multimedia Applications
Abstract – To bring QoS to the Internet, several better-thanbest-effort network services have been recently devised with significant efforts. The goal of this paper is to measure...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
APNOMS
2006
Springer
14 years 1 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
COOPIS
2004
IEEE
14 years 1 months ago
Evaluation of a Group Communication Middleware for Clustered J2EE Application Servers
Abstract. Clusters have become the de facto platform to scale J2EE application servers. Each tier of the server uses group communication to maintain consistency between replicated ...
Takoua Abdellatif, Emmanuel Cecchet, Renaud Lachai...
DSN
2004
IEEE
14 years 1 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...