Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
—A novel scheme for processing packets in a router is presented that provides load sharing among multiple network processors distributed within the router. It is complemented by ...
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
During past few years, a variety of methods have been developed for learning probabilistic networks from data, among which the heuristic single link forward or backward searches ar...
Compressed video is well known to be self-similar in nature. We model VBR carrying long-range dependent, multiplexed MPEG-2 video sources traffic. The actual traffic for the model...
Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain,...