Sciweavers

6682 search results - page 1284 / 1337
» networks 2006
Sort
View
IPCCC
2006
IEEE
14 years 4 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
ISCA
2006
IEEE
162views Hardware» more  ISCA 2006»
14 years 4 months ago
Design and Management of 3D Chip Multiprocessors Using Network-in-Memory
Long interconnects are becoming an increasingly important problem from both power and performance perspectives. This motivates designers to adopt on-chip network-based communicati...
Feihui Li, Chrysostomos Nicopoulos, Thomas D. Rich...
LCN
2006
IEEE
14 years 4 months ago
Utility-based Packet Scheduler for Wireless Communications
Abstract— Following widespread availability of wireless Internet, a wide range of applications with differing QoS requirements must share the wireless access. The objective of th...
Ana Aguiar, Adam Wolisz, Horst Lederer
NOMS
2006
IEEE
146views Communications» more  NOMS 2006»
14 years 4 months ago
BGP-Inspect - Extracting Information from Raw BGP Data
— While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and net...
Dionysus Blazakis, Manish Karir, John S. Baras
TRIDENTCOM
2006
IEEE
14 years 4 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
« Prev « First page 1284 / 1337 Last » Next »