Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,050 papers from all fields of science
Search
Sign In
Create Free Account
Ingress filtering
Known as:
BCP 38
, Ingress
, RFC 2827
Expand
In computer networking, ingress filtering is a technique used to ensure that incoming packets are actually from the networks from which they claim to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Bogon filtering
DDoS mitigation
Denial-of-service attack
Egress filtering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Prophet: Real-time Queue Length Inference in Programmable Switches
Quan Chen
,
Hailong Yang
,
M. Guo
,
R. Kannan
,
Jason Mars
,
Lingjia Tang
ACM SIGCOMM Symposium on Software Defined…
2019
Corpus ID: 218466006
Programmable switches enable the implementation of many complex network functions directly in the data plane. Protocol…
Expand
2016
2016
Autonomous Ingress of a UAV through a window using Monocular Vision
Abhinav Pachauri
,
Vikrant More
,
Pradeep Gaidhani
,
Nitin Gupta
arXiv.org
2016
Corpus ID: 15876419
The use of autonomous UAVs for surveillance purposes and other reconnaissance tasks is increasingly becoming popular and…
Expand
Review
2011
Review
2011
Recovery and bandwidth sharing techniques in MPLS networks
Najmul Hassan
,
A. Baig
,
Junaid Qadir
,
Imadud Din
8th International Conference on High-capacity…
2011
Corpus ID: 16635513
Failure of backbone nodes/links can have catastrophic consequences unless they are addressed in a timely manner. Multi-Protocol…
Expand
Review
2007
Review
2007
Weighted Fairness in Resilient Packet Rings
Mete Yilmaz
,
N. Ansari
IEEE International Conference on Communications
2007
Corpus ID: 15871599
The IEEE 802.17 is a standardized ring topology network architecture, called the resilient packet ring (RPR), to be used mainly…
Expand
2007
2007
E-Core – A Configurable IP Core for Application-specific NoC Performance Evaluation
S. Kubisch
,
H. Widiger
,
C. Cornelius
,
D. Timmermann
,
A. Strzeletz
2007
Corpus ID: 16333908
During the last years, Networks-on-Chip (NoCs) have become a true alternative for the design of complex integrated Systems-on…
Expand
2007
2007
Understanding actuation mechanisms of conjugated polymer actuators: Ion transport
Xuezhen Wang
2007
Corpus ID: 137245374
Title of Document: Understanding Actuation Mechanisms of Conjugated Polymer Actuators: Ion Transport Xuezheng Wang, Doctor of…
Expand
2004
2004
A graph-based methodology for analyzing IP spoofing attack
Voravud Santiraveewan
,
Y. Permpoontanalarp
18th International Conference on Advanced…
2004
Corpus ID: 18158831
Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to…
Expand
2004
2004
AIMD-based online MPLS traffic engineering for TCP flows via distributed multi-path routing
O. Alparslan
,
N. Akar
,
Ezhan Karasan
Ann. des Télécommunications
2004
Corpus ID: 9014154
With this paper, we propose a distributed online traffic engineering architecture formpls networks. In this architecture, a…
Expand
2003
2003
Bandwidth-delay constrained routing algorithms
Yi Yang
,
Lei Zhang
,
J. Muppala
,
S. Chanson
Comput. Networks
2003
Corpus ID: 756524
2002
2002
iSKIP: a fair and efficient scheduling algorithm for input-queued crossbar switches
Walter Wang
,
Libin Dong
,
W. Wolf
Global Telecommunications Conference, . GLOBECOM…
2002
Corpus ID: 1110438
Cell-based input-queued crossbars are widely used in networking equipments. A number of crossbar scheduling algorithms have been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE