Sciweavers

1039 search results - page 93 / 208
» networks 1998
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
14 years 26 days ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
INFOCOM
2002
IEEE
14 years 2 months ago
Adaptive Load Sharing for Network Processors
—A novel scheme for processing packets in a router is presented that provides load sharing among multiple network processors distributed within the router. It is complemented by ...
Lukas Kencl, Jean-Yves Le Boudec
MIS
1998
Springer
103views Multimedia» more  MIS 1998»
14 years 1 months ago
NETCICATS: Network-Conscious Image Compression and Transmission System
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
Sami Iren, Paul D. Amer, Phillip T. Conrad
AI
1998
Springer
14 years 1 months ago
A Hybrid Convergent Method for Learning Probabilistic Networks
During past few years, a variety of methods have been developed for learning probabilistic networks from data, among which the heuristic single link forward or backward searches ar...
Jun Liu, Kuo-Chu Chang, Jing Zhou
LCN
1998
IEEE
14 years 1 months ago
Performance of TCP over ABR with Long-Range Dependent VBR Background Traffic over Terrestrial and Satellite ATM networks
Compressed video is well known to be self-similar in nature. We model VBR carrying long-range dependent, multiplexed MPEG-2 video sources traffic. The actual traffic for the model...
Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain,...