Sciweavers

101 search results - page 18 / 21
» The Bloom paradox: When not to use a Bloom filter
Sort
View
TON
2002
170views more  TON 2002»
13 years 7 months ago
The BLUE active queue management algorithms
In order to stem the increasing packet loss rates caused by an exponential increase in network traffic, the IETF has been considering the deployment of active queue management tech...
Wu-chang Feng, Kang G. Shin, Dilip D. Kandlur, Deb...
WWW
2003
ACM
14 years 8 months ago
Scalable techniques for memory-efficient CDN simulations
Since CDN simulations are known to be highly memory-intensive, in this paper, we argue the need for reducing the memory requirements of such simulations. We propose a novel memory...
Purushottam Kulkarni, Prashant J. Shenoy, Weibo Go...
DSN
2004
IEEE
13 years 11 months ago
FRTR: A Scalable Mechanism for Global Routing Table Consistency
This paper presents a scalable mechanism, Fast Routing Table Recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of...
Lan Wang, Daniel Massey, Keyur Patel, Lixia Zhang
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
ISCA
2005
IEEE
117views Hardware» more  ISCA 2005»
14 years 28 days ago
Store Vulnerability Window (SVW): Re-Execution Filtering for Enhanced Load Optimization
The load-store unit is a performance critical component of a dynamically-scheduled processor. It is also a complex and non-scalable component. Several recently proposed techniques...
Amir Roth