Results 1 - 10
of
7,961
Table 7 : Packet Header.
1997
"... In PAGE 32: ... Notice again that LQ di erences of value greater than four have positively skewed distributions instead of normal distributions. Percentage of LQ Successes amp; Failures Table7 shows the percentage of LQ successes (i.e.... ..."
Cited by 151
Table 1: Packet header format
2006
"... In PAGE 18: ... This packet pair will be used to estimate the available bandwidth at the receiver side. The header format of each packet is shown in Table1 . OID identifies which object the packet contains data for.... ..."
Table 5: Detailed analysis of packet headers at USC.
2003
"... In PAGE 7: ... Three attacks were unclassified since they completely randomize the ID value. Table5 shows a detailed manual analysis of packet headers. Although it is difficult to directly compare with Table 2, we observe a similar set of attacks.... ..."
Cited by 105
Table 5: Detailed analysis of packet headers at USC.
"... In PAGE 8: ... Three attacks were unclassified since they completely randomize the ID value. Table5 shows a detailed manual analysis of packet headers. Although it is difficult to directly compare with Table 2, we observe a similar set of attacks.... ..."
Table 5: Detailed analysis of packet headers at USC.
"... In PAGE 7: ... Three attacks were unclassified since they completely randomize the ID value. Table5 shows a detailed manual analysis of packet headers. Although it is difficult to directly compare with Table 2, we observe a similar set of attacks.... ..."
Table 1: Network packet header layout
"... In PAGE 4: ... When generating the network packet, the a1 value along with a sequence number a5 (the number of all packets transmitted before this packet since the first packet of the first video frame) and the range of priorities a6 (a6a7a2a9a8 ), where a8 is the total number of quality layers in an encoded frame. Table1 shows the layout of the network packets. When a packet is received, either by the Rx Mapper host or by an active router, the embedded priority can be used to process the packet accordingly.... ..."
Table 1: BVR packet header fields
2005
Cited by 54
TABLE I IMPORTANT FIELDS IN APHD PACKET HEADER
TABLE 5 DISTRIBUTION OF CONTRIBUTION OF ANOMALOUS PACKET HEADER FIELDS TO DETECTED ATTACKS Ser Packet Header Field Frequency
Table #-1. Contribution (in bytes) to overhead reduction Packet Header
Results 1 - 10
of
7,961