Results 301 to 310 of about 6,499,676 (377)
Some of the next articles are maybe not open access.
, 2010
Eddie Schwartz is Chief Security Officer for NetWitness, the world leader in advanced threat intelligence and network forensics. He has 25 years of experience as an information security and privacy expert, specializing in the financial services and federal government sectors.
Eddie Schwartz
semanticscholar +3 more sources
Eddie Schwartz is Chief Security Officer for NetWitness, the world leader in advanced threat intelligence and network forensics. He has 25 years of experience as an information security and privacy expert, specializing in the financial services and federal government sectors.
Eddie Schwartz
semanticscholar +3 more sources
Networks with cognitive packets [PDF]
Based on our earlier work ("Towards networks with intelligent packets", Proc. 14th Int. Symp. on Computer and Information Sciences, p. 1-11, Oct. 1999), we discuss packet networks in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols.
Zhiguang Xu, Erol Gelenbe, Ricardo Lent
openaire +1 more source
SQR: In-network Packet Loss Recovery from Link Failures for Highly Reliable Datacenter Networks
IEEE International Conference on Network Protocols, 2019In datacenter networks, flows need to complete as quickly as possible because the flow completion time (FCT) directly impacts user experience, and thus revenue.
Ting Qu +5 more
semanticscholar +1 more source
Packet Flow on Telecommunication Networks
SIAM Journal on Mathematical Analysis, 2006The aim of this paper is to introduce a macroscopic fluid dynamic model dealing with the flow of information on a telecommunication network encoded in packets. Taking an intermediate time and space scale, we propose a model similar to that introduced recently for car traffic; see [G. M. Coclite, M. Garavello, and B. Piccoli, SIAM J. Math.
D'APICE, Ciro +2 more
openaire +4 more sources
Proceedings 11th International Conference on Tools with Artificial Intelligence, 2003
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols. Cognitive packets within a CPN route themselves. They are assigned goals before entering the network and pursue these goals adaptively.
Erol Gelenbe, E. Seref, Zhiguang Xu
openaire +2 more sources
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols. Cognitive packets within a CPN route themselves. They are assigned goals before entering the network and pursue these goals adaptively.
Erol Gelenbe, E. Seref, Zhiguang Xu
openaire +2 more sources
Packet Switched Networks [PDF]
The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary ...
openaire +1 more source
Packet Sniffers and Network Monitors
Information Systems Security, 2000Abstract Communications take place in forms that range from simple voice conversations to complicated manipulations of light. Each type of communication is based on two basic principles: wave theory and particle theory. In essence, communication can be established by the use of either, frequently in concert with a carrier or medium to provide ...
James S. Tiller, Bryan D. Fish
openaire +2 more sources

