Sciweavers

1709 search results - page 234 / 342
» networks 2000
Sort
View
NGC
2000
Springer
14 years 15 days ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
DSS
2000
105views more  DSS 2000»
13 years 8 months ago
Dynamic behavior of differential pricing and quality of service options for the internet
Abstract. The simple model on which the Internet has operated, with all packets treated equally, and charges only for access links to the network, has contributed to its explosive ...
Peter C. Fishburn, Andrew M. Odlyzko
NGC
2000
Springer
109views Communications» more  NGC 2000»
14 years 15 days ago
Router level filtering for receiver interest delivery
Delivering data to on-line game participants requires the game data to be "customized" in real-time to each participant's characteristics. Using multicast in such a...
Manuel M. Oliveira, Jon Crowcroft, Christophe Diot
ICPR
2000
IEEE
14 years 10 months ago
Visual Extraction of Motion-Based Information from Image Sequences
We describe a system which is designed to assist in extracting high-level information from sets or sequences of images. We show that the method of principal components analysis fo...
David P. Gibson, Neill W. Campbell, Colin J. Dalto...
RAID
2000
Springer
14 years 15 days ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner