Sciweavers

551 search results - page 28 / 111
» Probing TCP Implementations
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...
LCN
2005
IEEE
14 years 3 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
IH
2005
Springer
14 years 3 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
CN
2004
122views more  CN 2004»
13 years 9 months ago
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
This paper is a summary of the BBN Technical Report No. 8333, "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks." In this study we di...
Rajesh Krishnan, James P. G. Sterbenz, Wesley M. E...
CN
1999
92views more  CN 1999»
13 years 9 months ago
Managing TCP Connections Under Persistent HTTP
Hyper Text Transfer Protocol (HTTP) traffic dominates Internet traffic. The exchange of HTTP messages is implemented
Edith Cohen, Haim Kaplan, Jeffrey D. Oldham