Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Buffer and error management techniques in voice over IP
Download
119231.pdf
Date
2002
Author
Ceylan, Serkan
Metadata
Show full item record
Item Usage Stats
61
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/13109
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Buffer Sharing on an OFDMA Downlink
GİRİCİ, TOLGA; Ozel, Omur; Uysal, Elif (2010-09-30)
In this work we consider the allocation of buffer space to data streams sharing a common high-speed wireless transmitter. As an example, we focus on an OFDMA-based downlink system scenario. Scheduling for maximum throughput has been extensively studied in the literature. However, the practically interesting case of a finite buffer has not been sufficiently addressed before. Especially in the case of overloaded packet queues, the choice of buffer management policy substantially affects the throughput perform...
Context-sensitive and keyword density-based supervised machine learning techniques for malicious webpage detection
Altay, Betul; Dokeroglu, Tansel; Coşar, Ahmet (2019-06-01)
Conventional malicious webpage detection methods use blacklists in order to decide whether a webpage is malicious or not. The blacklists are generally maintained by third-party organizations. However, keeping a list of all malicious Web sites and updating this list regularly is not an easy task for the frequently changing and rapidly growing number of webpages on the web. In this study, we propose a novel context-sensitive and keyword density-based method for the classification of webpages by using three su...
Window Based Fair Aggregator for the Scalable Support of QoS Guarantees in the Backbone: An Experimental Performance Study
Sanli, Mustafa; Pehlivanli, Aydin; Schmidt, Şenan Ece (2016-02-18)
Video and voice traffic currently have the biggest share in the Internet. These applications require end-to-end Quality of Service (QoS) guarantees for each flow. The packet schedulers in the routers play an important role in providing end-to-end QoS support in the Internet. It is important that the implementation of packet schedulers scale with the steady increase in the data rates and the number of flows. In our previous work we proposed Window Based Fair Aggregator (WBFA) to decrease the number of flows....
Memory organization in pipelined hierarchical search structures for packet classification
Rumelili, Çağla Irmak; Bazlamaçcı, Cüneyt Fehmi; Erdem, Oğuzhan; Department of Electrical and Electronics Engineering (2013)
Packet classification is a main requirement in routers to manage network security and traffi c. In high speed networks packet classification in line rates has become a major challenge. Our design mainly benefits from a parallel pipelined architecture implemented on field programmable gate arrays (FPGA) to achieve high speed packet processing. The presented solution is based on Hierarchical Hybrid Search Structure (HHSS) [5]. Our work solves the deep pipeline problem of HHSS in a memory e fficient way. This ...
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
Calik, Cagdas; Turan, Meltem Sonmez (2010-08-11)
Hamsi is one of the second round candidates of the SHA-3 competition In this study, we present non-random differential properties for the compression function of Hamsi-256 Based on these properties, we first demonstrate a distinguishing attack that requires a few evaluations of the compression function Then, we present a message recovery attack with a complexity of 210 48 compression function evaluations Also, we present a pseudo-preimage attack for the compression function with complexity 2(254 25)
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
S. Ceylan, “Buffer and error management techniques in voice over IP,” M.S. - Master of Science, Middle East Technical University, 2002.