Sciweavers

589 search results - page 75 / 118
» internet 2000
Sort
View
SIGCOMM
2000
ACM
14 years 1 months ago
Equation-based congestion control for unicast applications
This paper proposes a mechanism for equation-based congestion control for unicast traffic. Most best-effort traffic in the current Internet is well-served by the dominant transp...
Sally Floyd, Mark Handley, Jitendra Padhye, Jö...
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
14 years 12 days ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
AAAI
2000
13 years 10 months ago
Robust Combinatorial Auction Protocol against False-Name Bids
This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commer...
Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara
ECIS
2000
13 years 10 months ago
Transforming Healthcare in Australia: The PeCC Initiative
Many of the current crises in contemporary healthcare management centre on issues concerning information management and costs. Electronic commerce (or e-commerce) activity, grounde...
Elizabeth More, G. Michael McGrath
NETWORKING
2000
13 years 10 months ago
Network-Driven Layered Multicast with IPv6
Receiver-driven Layered Multicast (RLM) has previously been proposed to distribute video over the best-effort heterogeneous IP networks. Although RLM can avoid network overloading ...
Ho-pong Sze, Soung C. Liew