Institution
Alcatel-Lucent
Stuttgart, Germany•
About: Alcatel-Lucent is a based out in Stuttgart, Germany. It is known for research contribution in the topics: Signal & Network packet. The organization has 37003 authors who have published 53332 publications receiving 1430547 citations. The organization is also known as: Alcatel-Lucent S.A. & Alcatel.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, strong overlap of adjacent pulses in dispersion-managed return-to-zero transmission was shown to reduce pulse-topulse interaction and timing jitter, and the limiting factors for this pulse-overlapped transmission were the amplitude fluctuations and the ghost pulse generation induced by four-wave mixing between spectral components within a single channel.
Abstract: We show that strong overlap of adjacent pulses in dispersion-managed return-to-zero transmission reduces pulse-to-pulse interaction and timing jitter. The limiting factors for this pulse-overlapped transmission are the amplitude fluctuations and the ghost pulse generation induced by four-wave mixing between spectral components within a single channel.
231 citations
••
TL;DR: In this paper, le poly(bpy) 2 (vpy 2 ] (ClO 4 ) x (x=0-3, bpy=bipyridine-2,2' and vpy=vinyl-4 pyridine)
Abstract: Donnees obtenues pour le poly [Os(bpy) 2 (vpy 2 ] (ClO 4 ) x (x=0-3, bpy=bipyridine-2,2' et vpy=vinyl-4 pyridine)
230 citations
••
TL;DR: In this article, an explicit rate indication for congestion avoidance (ERICA) scheme for rate-based feedback from asynchronous transfer mode (ATM) switches is described. But the scheme is designed to achieve high link utilization with low delays and fast transient response and is also fair and robust to measurement errors caused by the variations in ABR demand and capacity.
Abstract: This paper describes the "explicit rate indication for congestion avoidance" (ERICA) scheme for rate-based feedback from asynchronous transfer mode (ATM) switches. In ERICA, the switches monitor their load on each link and determine a load factor, the available capacity, and the number of currently active virtual channels. This information is used to advise the sources about the rates at which they should transmit. The algorithm is designed to achieve high link utilization with low delays and fast transient response. It is also fair and robust to measurement errors caused by the variations in ABR demand and capacity. We present performance analysis of the scheme using both analytical arguments and simulation results. The scheme is being considered for implementation by several ATM switch manufacturers.
230 citations
•
15 Jun 2007TL;DR: In this article, a method and system for generating a bloom filter by mapping into respective groups each of a plurality of initial keys according to a first hash function and mapping each group hashed key into a Bloom filter using k respective hash functions.
Abstract: A method and system for generating a bloom filter by mapping into respective groups each of a plurality of initial keys according to a first hash function and mapping each group hashed key into a bloom filter using k respective hash functions.
230 citations
•
21 Dec 2004TL;DR: In this paper, the authors proposed a virtual local area network (VLAN) rule or access control list (ACL) rule that causes the network node to route any packets from the intruder into a quarantine VLAN or otherwise isolate the traffic from other network traffic.
Abstract: The invention in the preferred embodiment features a system (200) and method for automatically segregating harmful traffic from other traffic at a plurality of network nodes including switches and routers. In the preferred embodiment, the system (200) comprises an intrusion detection system (105) to determine the identity of an intruder and a server (130) adapted to automatically install an isolation rule on the one or more network nodes (114, 115, 116) to quarantine packets from the intruder. The isolation rule in the preferred embodiment is a virtual local area network (VLAN) rule or access control list (ACL) rule that causes the network node to route any packets from the intruder into a quarantine VLAN or otherwise isolate the traffic from other network traffic. In large networks, the isolation rule may be installed on a select plurality of network nodes under the gateway router (104) associated with the node at which the intruder first entered the network (100).
230 citations
Authors
Showing all 37011 results
Name | H-index | Papers | Citations |
---|---|---|---|
George M. Whitesides | 240 | 1739 | 269833 |
Yoshua Bengio | 202 | 1033 | 420313 |
John A. Rogers | 177 | 1341 | 127390 |
Zhenan Bao | 169 | 865 | 106571 |
Thomas S. Huang | 146 | 1299 | 101564 |
Federico Capasso | 134 | 1189 | 76957 |
Robert S. Brown | 130 | 1243 | 65822 |
Christos Faloutsos | 127 | 789 | 77746 |
Robert J. Cava | 125 | 1042 | 71819 |
Ramamoorthy Ramesh | 122 | 649 | 67418 |
Yann LeCun | 121 | 369 | 171211 |
Kamil Ugurbil | 120 | 536 | 59053 |
Don Towsley | 119 | 883 | 56671 |
Steven P. DenBaars | 118 | 1366 | 60343 |
Robert E. Tarjan | 114 | 400 | 67305 |