Sciweavers

144 search results - page 9 / 29
» ton 2008
Sort
View
132
Voted
TON
2008
102views more  TON 2008»
15 years 3 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
130
Voted
TON
2008
89views more  TON 2008»
15 years 2 months ago
Simple summaries for hashing with choices
In a multiple-choice hashing scheme, each item is stored in one of 2 possible hash table buckets. The availability of these multiple choices allows for a substantial reduction in t...
Adam Kirsch, Michael Mitzenmacher
156
Voted
TON
1998
186views more  TON 1998»
15 years 3 months ago
Virtual path control for ATM networks with call level quality of service guarantees
— The configuration of virtual path (VP) connection services is expected to play an important role in the operation of large-scale asynchronous transfer mode (ATM) networks. A m...
Nikolaos Anerousis, Aurel A. Lazar
116
Voted
TON
1998
77views more  TON 1998»
15 years 3 months ago
Time-shift scheduling - fair scheduling of flows in high-speed networks
—We present a scheduling protocol, called time-shift scheduling, to forward packets from multiple input flows to a single output channel. Each input flow is guaranteed a predet...
Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
109
Voted
TON
1998
68views more  TON 1998»
15 years 3 months ago
Optimal capacity placement for path restoration in STM or ATM mesh-survivable networks
Abstract—The total transmission capacity required by a transport network to satisfy demand and protect it from failures contributes significantly to its cost, especially in long...
Rainer R. Iraschko, Mike H. MacGregor, Wayne D. Gr...