Sciweavers

551 search results - page 68 / 111
» Probing TCP Implementations
Sort
View
RAID
2005
Springer
14 years 2 months ago
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card
Abstract. CardGuard is a signature detection system for intrusion detection and prevention that scans the entire payload of packets for suspicious patterns and is implemented in so...
Herbert Bos, Kaiming Huang
ICOIN
2004
Springer
14 years 1 months ago
A Study of Internet Packet Reordering
Packet reordering is a well-known phenomenon that the order of packets is inverted in the Internet. Previous research indicates reordering can affect the performance of both the ne...
Yi Wang, Guohan Lu, Xing Li
INFOCOM
2002
IEEE
14 years 1 months ago
A Congestion Control Algorithm for Tree-based Reliable Multicast Protocols
— This paper contains a detailed description of the congestion control algorithm of TRAM, a tree-based reliable multicast protocol. This algorithm takes advantage of regular ackn...
Dah-Ming Chiu, Miriam Kadansky, Joe Provino, Josep...
SIGCOMM
1996
ACM
14 years 19 days ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
QOFIS
2000
Springer
14 years 2 days ago
Random Early Marking
In this paper we present an optimisation approach to congestion flow control. The initial context of this approach was as a rate based flow control in ATM networks. We describe te...
Sanjeewa Athuraliya, Steven H. Low, David E. Lapsl...