Sciweavers

135 search results - page 17 / 27
» Securing the data path of next-generation router systems
Sort
View
SIGMETRICS
2004
ACM
141views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Spatio-temporal available bandwidth estimation with STAB
We study the problem of locating in space and over time a network path’s tight link, that is the link with the least available bandwidth on the path. Tight link localization ben...
Vinay J. Ribeiro, Rudolf H. Riedi, Richard G. Bara...
LISA
2003
13 years 10 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
MIS
1998
Springer
103views Multimedia» more  MIS 1998»
14 years 24 days ago
NETCICATS: Network-Conscious Image Compression and Transmission System
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
Sami Iren, Paul D. Amer, Phillip T. Conrad
AAAI
2007
13 years 11 months ago
Using AI for e-Government Automatic Assessment of Immigration Application Forms
This paper describes an e-Government AI project that provides a range of intelligent AI services to support automated assessment of various types of applications submitted to an i...
Andy Hon Wai Chun
CN
2007
116views more  CN 2007»
13 years 8 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer