Sciweavers

1657 search results - page 299 / 332
» Network flow spanners
Sort
View
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 5 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
ICCD
2004
IEEE
107views Hardware» more  ICCD 2004»
14 years 5 months ago
Network-on-Chip: The Intelligence is in The Wire
In this paper we describe how Network-on-Chip (NoC) will be the next major challenge to implementing complex and function-rich applications in advanced manufacturing processes at ...
Gérard Mas, Philippe Martin
GLOBECOM
2008
IEEE
14 years 3 months ago
Queuing Performance of Long-Range Dependent Traffic Regulated by Token-Bucket Policers
 Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely affects network performance yielding longer queuing delays. Token-bucket policers ...
Stefano Bregni, Roberto Cioffi, Paolo Giacomazzi
GLOBECOM
2008
IEEE
14 years 3 months ago
On Traffic Long-Range Dependence at the Output of Schedulers with Multiple Service Classes
 Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely impacts network performance yielding longer queuing delays. Moreover, LRD is almos...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
ICC
2008
IEEE
147views Communications» more  ICC 2008»
14 years 3 months ago
QOAR: Adaptive QoS Scheme in Multi-Rate Wireless LANs
—With the availability of multiple rates in IEEE 802.11a/b/g wireless LANs, it is desirable to improve the network capacity and temporal fairness by sending multiple consecutive ...
Ming Li, Yang Xiao, Hua Zhu, Imrich Chlamtac, Bala...