• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,961
Next 10 →

Table 7 : Packet Header.

in Associativity-Based Routing For Ad-Hoc Mobile Networks
by Chai-Keong Toh University, Chai-keong Toh 1997
"... In PAGE 32: ... Notice again that LQ di erences of value greater than four have positively skewed distributions instead of normal distributions. Percentage of LQ Successes amp; Failures Table7 shows the percentage of LQ successes (i.e.... ..."
Cited by 151

Table 1: Packet header format

in Acknowledgements
by Angshuman Roy 2006
"... In PAGE 18: ... This packet pair will be used to estimate the available bandwidth at the receiver side. The header format of each packet is shown in Table1 . OID identifies which object the packet contains data for.... ..."

Table 5: Detailed analysis of packet headers at USC.

in A Framework for Classifying Denial of Service Attacks
by Alefiya Hussain, John Heidemann, Christos Papadopoulos 2003
"... In PAGE 7: ... Three attacks were unclassified since they completely randomize the ID value. Table5 shows a detailed manual analysis of packet headers. Although it is difficult to directly compare with Table 2, we observe a similar set of attacks.... ..."
Cited by 105

Table 5: Detailed analysis of packet headers at USC.

in A Framework for Classifying Denial of Service Attacks
by Alefiya Hussain, John Heidemann, Christos Papadopoulos
"... In PAGE 8: ... Three attacks were unclassified since they completely randomize the ID value. Table5 shows a detailed manual analysis of packet headers. Although it is difficult to directly compare with Table 2, we observe a similar set of attacks.... ..."

Table 5: Detailed analysis of packet headers at USC.

in A Framework for Classifying Denial of Service Attacks
by Alefiya Hussain , John Heidemann, Christos Papadopoulos
"... In PAGE 7: ... Three attacks were unclassified since they completely randomize the ID value. Table5 shows a detailed manual analysis of packet headers. Although it is difficult to directly compare with Table 2, we observe a similar set of attacks.... ..."

Table 1: Network packet header layout

in Motion-JPEG2000 Video Transmission Over Active Network
by Ruibiao Qiu, Wei Yu, Jason Fritts
"... In PAGE 4: ... When generating the network packet, the a1 value along with a sequence number a5 (the number of all packets transmitted before this packet since the first packet of the first video frame) and the range of priorities a6 (a6a7a2a9a8 ), where a8 is the total number of quality layers in an encoded frame. Table1 shows the layout of the network packets. When a packet is received, either by the Rx Mapper host or by an active router, the embedded priority can be used to process the packet accordingly.... ..."

Table 1: BVR packet header fields

in Beacon Vector Routing: Scalable Point-to-Point in Wireless Sensornets
by Rodrigo Fonseca, Rodrigo Fonseca, Sylvia Ratnasamy, Sylvia Ratnasamy, David Culler, David Culler, Scott Shenker, Scott Shenker, Ion Stoica, Ion Stoica 2005
Cited by 54

TABLE I IMPORTANT FIELDS IN APHD PACKET HEADER

in APHD: End-to-End Delay Assurance in 802.11e Based MANETs Abstract—
by unknown authors

TABLE 5 DISTRIBUTION OF CONTRIBUTION OF ANOMALOUS PACKET HEADER FIELDS TO DETECTED ATTACKS Ser Packet Header Field Frequency

in Modelling Anomaly Based Network Intrusion Detection System Using Packet Header Protocols
by unknown authors

Table #-1. Contribution (in bytes) to overhead reduction Packet Header

in Chapter # REESTABLSIHSMENT OF HEADER COMPRESSION STATE BY CONTEXT TRANSFER IN MOBILE IP NETWORKS
by Ha Duong, Arek Dadej, Steven Gordon
Next 10 →
Results 1 - 10 of 7,961
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University