Sciweavers

291 search results - page 34 / 59
» Linear Types for Packet Processing
Sort
View
PDPTA
2003
13 years 9 months ago
The Performance of Routing Algorithms under Bursty Traffic Loads
Routing algorithms are traditionally evaluated under Poisson-like traffic distributions. This type of traffic is smooth over large time intervals and has been shown not necessaril...
Jeonghee Shin, Timothy Mark Pinkston
GLOBECOM
2010
IEEE
13 years 5 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
DSN
2009
IEEE
14 years 2 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
COR
2008
129views more  COR 2008»
13 years 7 months ago
Queues in DOCSIS cable modem networks
In this paper we determine the optimal fraction c of the uplink channel capacity that should be dedicated to the contention channel in a DOCSIS cable network in order to minimize ...
Joke Lambert, Benny Van Houdt, Chris Blondia
AMC
2010
83views more  AMC 2010»
13 years 7 months ago
Windowed Fourier transform of two-dimensional quaternionic signals
In this paper, we generalize the classical windowed Fourier transform (WFT) to quaternionvalued signals, called the quaternionic windowed Fourier transform (QWFT). Using the spect...
Mawardi Bahri, Eckhard S. M. Hitzer, Ryuichi Ashin...