Sciweavers

LCN
1998
IEEE
14 years 3 months ago
QoS Routing in Ad Hoc Wireless Networks
Abstract-- The emergence of nomadic applications have recently generated much interest in wireless network infrastructures that support real-time communications. In this paper, we ...
C. R. Lin
LCN
1998
IEEE
14 years 3 months ago
Effect of Hidden Terminals on the Performance of IEEE 802.11 MAC Protocol
The hidden terminal problem is unique to wireless networks and as of now, there is very limited understanding about it's effects on network performance. Results are presented...
Sumit Khurana, Anurag Kahol, Anura P. Jayasumana
LCN
1998
IEEE
14 years 3 months ago
Performance of TCP over ABR with Long-Range Dependent VBR Background Traffic over Terrestrial and Satellite ATM networks
Compressed video is well known to be self-similar in nature. We model VBR carrying long-range dependent, multiplexed MPEG-2 video sources traffic. The actual traffic for the model...
Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain,...
LCN
1998
IEEE
14 years 3 months ago
Providing Rate Guarantees to TCP over the ATM GFR Service
The ATM Guaranteed Frame Rate GFR service is intended for best e ort tra c that can bene t from minimum throughput guarantees. Edge devices connecting LANs to an ATM network can u...
Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalor...
LCN
1998
IEEE
14 years 3 months ago
Multicasting Multimedia Streams with Active Networks
Active networks allow code to be loaded dynamically into network nodes at run-time. This code can perform tasks specific to a stream of packets or even a single packet. In this pa...
Albert Banchs, Wolfgang Effelsberg, Christian F. T...
RAID
1999
Springer
14 years 3 months ago
Results of the DARPA 1998 Offline Intrusion Detection Evaluation
Richard Lippmann, Robert K. Cunningham, David J. F...
RAID
1999
Springer
14 years 3 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
RAID
1999
Springer
14 years 3 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
RAID
1999
Springer
14 years 3 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier