Sciweavers

4004 search results - page 37 / 801
» How Many Packets Can We Encode
Sort
View
110
Voted
CCR
2006
116views more  CCR 2006»
15 years 2 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
93
Voted
CN
2006
80views more  CN 2006»
15 years 2 months ago
Delay bound and packet scale rate guarantee for some expedited forwarding networks
Expedited Forwarding (EF) is a service defined under the Differentiated Services framework. Based on its recently revised definition in IETF RFC 3246, Packet Scale Rate Guarantee ...
Yuming Jiang
CCS
2011
ACM
14 years 2 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
114
Voted
RTSS
2000
IEEE
15 years 6 months ago
Analysis of a Window-Constrained Scheduler for Real-Time and Best-Effort Packet Streams
This paper describes how Dynamic WindowConstrained Scheduling (DWCS) can guarantee real-time service to packets from multiple streams with different performance objectives. We sho...
Richard West, Christian Poellabauer
115
Voted
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 8 months ago
On MAC Scheduling and Packet Combination Strategies for Practical Random Network Coding
— The present paper investigates practical algorithms to efficiently exploit random network coding for data delivery in multi-hop wireless networks. In the past few years, a gre...
Elena Fasolo, Michele Rossi, Jörg Widmer, Mic...