Sciweavers

418 search results - page 82 / 84
» IP switching - ATM under IP
Sort
View
FM
2006
Springer
146views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
USS
2008
13 years 9 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
BIOCOMP
2007
13 years 9 months ago
xMAN: extreme MApping of oligoNucleotides
Background: The ability to rapidly map millions of oligonucleotide fragments to a reference genome is crucial to many high throughput genomic technologies. Results: We propose an ...
Wei Li, Jason S. Carroll, Myles Brown, X. Shirley ...
LREC
2010
180views Education» more  LREC 2010»
13 years 9 months ago
Collecting Voices from the Cloud
The collection and transcription of speech data is typically an expensive and time-consuming task. Voice over IP and cloud computing are poised to greatly reduce this impediment t...
Ian McGraw, Chia-ying Lee, I. Lee Hetherington, St...
PDPTA
2007
13 years 8 months ago
Scalable Overlay Multicast Tree Construction for Media Streaming
Overlay networks have become popular in recent times for content distribution and end-system multicasting of media streams. In the latter case, the motivation is based on the lack...
Gabriel Parmer, Richard West, Gerald Fry