Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Bluetooth is a wireless specification delivering short-range radio communication between electronic devices that are equipped with specialized Bluetooth chips. It lets nearly all ...
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been propos...
Sailesh Kumar, Michela Becchi, Patrick Crowley, Jo...
TCP(α,β) protocols trade the congestion window increase value α for the decrease ratio β , to generate smoother traffic patterns and to maintain a friendly behavior. In this p...
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...