Sciweavers

3895 search results - page 757 / 779
» Measuring the effectiveness of ACATS
Sort
View
IMC
2009
ACM
14 years 4 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...
IMC
2009
ACM
14 years 4 months ago
The importance of being overheard: throughput gains in wireless mesh networks
A flurry of recent work has focused on the performance gains that may be achieved by leveraging the broadcast nature of the wireless channel. In particular, researchers have obse...
Mikhail Afanasyev, Alex C. Snoeren
SYSTOR
2009
ACM
14 years 4 months ago
Energy and performance evaluation of lossless file data compression on server systems
Data compression has been claimed to be an attractive solution to save energy consumption in high-end servers and data centers. However, there has not been a study to explore this...
Rachita Kothiyal, Vasily Tarasov, Priya Sehgal, Er...
ACSAC
2008
IEEE
14 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GLOBECOM
2008
IEEE
14 years 4 months ago
Friendly P2P: Application-Level Congestion Control for Peer-to-Peer Applications
Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng, Gw...