Zobrazeno 1 - 10
of 200
pro vyhledávání: '"Tilman Wolf"'
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 34:5664-5680
Multi-set membership queries are fundamental operations in data science. In this paper, we propose a new data structure for multi-set membership queries, named coloring embedder, which is fast, accurate, and memory efficient. The idea of coloring emb
Publikováno v:
NETNOMICS: Economic Research and Electronic Networking. 22:283-316
Autor:
Puming Fang, Tilman Wolf
Publikováno v:
2023 International Conference on Computing, Networking and Communications (ICNC).
Publikováno v:
IEEE Transactions on Network and Service Management. 16:1581-1594
Software-defined networking (SDN) provides flexible network control, which has enabled new, more complex network control mechanisms. These approaches impose high demands on flow updates in OpenFlow switches. Existing SDN controllers and firmware have
Publikováno v:
2021 ASEE Virtual Annual Conference Content Access Proceedings.
Autor:
Puming Fang, Tilman Wolf
Publikováno v:
INFOCOM Workshops
Virtual network functions, which are placed logically in the path of a network connection, implement important processing steps, such as content inspection, load balancing, etc. While these types of operations are well-understood in the context of th
Publikováno v:
IEEE Communications Magazine. 56:124-130
© 1979-2012 IEEE. ICN is a novel communication paradigm that assigns names to content chunks (instead of IP addresses to hosts). ICN offers inherent features such as content metadata and in-network caching, which make it possible to reduce content t
Autor:
Tilman Wolf, C. Hollot, Russell Tessier, Bryan Polivka, Chris Hoehn-Saric, Janet Donghee Kang, Katherine Newman
Publikováno v:
2019 ASEE Annual Conference & Exposition Proceedings.
Publikováno v:
2020 ASEE Virtual Annual Conference Content Access Proceedings.
Autor:
Tilman Wolf, Hao Cai
Publikováno v:
ICCCN
The ability of a network node to verify where traffic is coming from and what path that traffic traversed is important for developing secure network protocols and defense mechanisms against attacks. Cryptographic approaches to source authentication a