Sciweavers

2715 search results - page 4 / 543
» Network bucket testing
Sort
View
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
13 years 12 months ago
On achievable service differentiation with token bucket marking for TCP
The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service differentiation among flows without any per-flow buffer manage...
Sambit Sahu, Philippe Nain, Christophe Diot, Victo...
INFOCOM
1993
IEEE
13 years 11 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
ICMCS
2005
IEEE
96views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Elastic Traffic Policer for MPEG Video Streams
Multimedia applications like MPEG-2 video produce packets with multiple levels of importance from application quality point of view. We propose a traffic policing mechanism for s...
Emre Gündüzhan
ECAI
2004
Springer
14 years 1 months ago
Using Constraints with Memory to Implement Variable Elimination
Abstract. Adaptive consistency is a solving algorithm for constraint networks. Its basic step is variable elimination: it takes a network as input, and producesan equivalent networ...
Martí Sánchez, Pedro Meseguer, Javie...
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin