Sciweavers

1709 search results - page 110 / 342
» networks 2000
Sort
View
SP
2000
IEEE
14 years 2 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
RSA
2010
89views more  RSA 2010»
13 years 8 months ago
Edge flows in the complete random-lengths network
Consider the complete n-vertex graph whose edge-lengths are independent exponentially distributed random variables. Simultaneously for each pair of vertices, put a constant flow ...
David J. Aldous, Shankar Bhamidi
MOBIHOC
2000
ACM
14 years 2 months ago
Content based multicast (CBM) in ad hoc networks
Abstract— This paper presents a radically new multicast model for ad hoc wireless networks. In this model, the content of the multicast data determines the receiver set for the d...
Hu Zhou, Suresh Singh
LCN
2000
IEEE
14 years 2 months ago
Measurement of ATM Frame Latency
This paper addresses the problem of measuring frame latency in ATM switches. The frames consisting of several ATM cells may arrive with numerous gaps between cells. It is importan...
Arjan Durresi, Gojko Babic, Raj Jain
CLUSTER
2000
IEEE
14 years 2 months ago
Enabling High Performance Data Transfer on Cluster Architecture
In this article, we present some results on the communication performance of TCP/IP in a cluster of Pentium based workstations connected by a Gigabit Ethernet network. The experim...
Paul A. Farrell, Hong Ong, Stephen L. Scott