Sciweavers

1657 search results - page 212 / 332
» Network flow spanners
Sort
View
CN
2008
84views more  CN 2008»
13 years 10 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
ICCD
2006
IEEE
121views Hardware» more  ICCD 2006»
14 years 7 months ago
Power/ground supply network optimization for power-gating
-- Power-gating is a technique for efficiently reducing leakage power by shutting off the idle blocks. However, the presence of power-gating may also introduce negative effects on ...
Hailin Jiang, Malgorzata Marek-Sadowska
INFOCOM
2009
IEEE
14 years 4 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 4 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 4 months ago
Bounded-Variance Network Calculus: Computation of Tight Approximations of End-to-End Delay
Abstract ⎯ Currently, the most advanced framework for stochastic network calculus is the min-plus algebra, providing bounds for the end-to-end delay in networks. The bounds calcu...
Paolo Giacomazzi, Gabriella Saddemi