Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
—In this paper we present an architectural analysis of a smart DMA (sDMA) controller for protocol stack acceleration in mobile devices supporting 3GPP’s Long Term Evolution (LT...
Sebastian Hessel, David Szczesny, Felix Bruns, Att...
We introduce AsyMAC, a MAC layer protocol for wireless networks with asymmetric links and study a protocol stack consisting of AsyMAC and the A4 LP routing protocol. The two proto...
This paper discusses an efficient design and implementation of control and multiplexing protocols H.245 and H.223, which is an important part of 3G324M protocol stack, for mobile w...
-- Future distributed applications are expected to be deployed in an environment that is more dynamic and heterogeneous than ever before. The environment features are difficult to ...
Network Architecture (PONA) and an abstract two part protocol stack with a virtualization layer in between. We also introduce the concept of generalized communication end-points
Data copying and checksumming are the most expensive operations when doing high-bandwidth network IO over a highspeed network. Under some conditions, outboard buffering and checks...
We present measurement approaches to evaluate performance optimizations, employed at different layers of the protocol stack, to enhance application performance over wide-area wire...
Rajiv Chakravorty, Julian Chesterfield, Pablo Rodr...
Abstract. The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are underminin...
Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars ...