Abstract-- The emergence of nomadic applications have recently generated much interest in wireless network infrastructures that support real-time communications. In this paper, we ...
The hidden terminal problem is unique to wireless networks and as of now, there is very limited understanding about it's effects on network performance. Results are presented...
Compressed video is well known to be self-similar in nature. We model VBR carrying long-range dependent, multiplexed MPEG-2 video sources traffic. The actual traffic for the model...
Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain,...
The ATM Guaranteed Frame Rate GFR service is intended for best e ort tra c that can bene t from minimum throughput guarantees. Edge devices connecting LANs to an ATM network can u...
Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalor...
Active networks allow code to be loaded dynamically into network nodes at run-time. This code can perform tasks specific to a stream of packets or even a single packet. In this pa...
Albert Banchs, Wolfgang Effelsberg, Christian F. T...
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...