<--- Back to Details
First PageDocument Content
Computer network security / Middlebox / Data-flow analysis / Scope / Transmission Control Protocol / Robust random early detection / ALGOL 68 / Subroutine / Parameter / Algorithm
Date: 2016-02-29 22:59:54
Computer network security
Middlebox
Data-flow analysis
Scope
Transmission Control Protocol
Robust random early detection
ALGOL 68
Subroutine
Parameter
Algorithm

Paving the Way for NFV: Simplifying Middlebox Modifications using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella University of Wisconsin-Madison Abstract

Add to Reading List

Source URL: opennf.cs.wisc.edu

Download Document from Source Website

File Size: 1,11 MB

Share Document on Facebook

Similar Documents

Flow Rate Management and P2P Control

Flow Rate Management and P2P Control

DocID: 1r9FN - View Document

Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002  Switched Systems:

Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002 Switched Systems:

DocID: 1qpRO - View Document

Flow Rate Management and P2P Control

Flow Rate Management and P2P Control

DocID: 1qfsO - View Document

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

DocID: 1q3S9 - View Document

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

DocID: 1pSMR - View Document