Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,362,805 papers from all fields of science
Search
Sign In
Create Free Account
Network packet
Known as:
Packet (network)
, Packet
, Packet (information technology)
Expand
A network packet is a formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application-oriented networking
Argus - Audit Record Generation and Utilization System
Bicycle attack
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Wireless Video Quality Assessment: A Study of Subjective Scores and Objective Algorithms
Anush K. Moorthy
,
K. Seshadrinathan
,
R. Soundararajan
,
A. Bovik
IEEE transactions on circuits and systems for…
2010
Corpus ID: 10481554
Evaluating the perceptual quality of video is of tremendous importance in the design and optimization of wireless video…
Expand
Review
2008
Review
2008
Contention avoidance and resolution schemes in bufferless all-optical packet-switched networks: a survey
A. Rahbar
,
O. Yang
IEEE Communications Surveys and Tutorials
2008
Corpus ID: 206583346
Optical Packet Switching (OPS) is the promising switching technique to utilize the huge bandwidth offered by all-optical networks…
Expand
Highly Cited
2006
Highly Cited
2006
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS
T. Leinmüller
,
E. Schoch
,
F. Kargl
IEEE wireless communications
2006
Corpus ID: 3080455
Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs…
Expand
Highly Cited
2004
Highly Cited
2004
Automatic generation and analysis of NIDS attacks
Shai Rubin
,
S. Jha
,
B. Miller
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 15249786
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance…
Expand
Highly Cited
2003
Highly Cited
2003
Achieving faster failure detection in OSPF networks
M. Goyal
,
K. K. Ramakrishnan
,
W. Feng
IEEE International Conference on Communications…
2003
Corpus ID: 10294218
A network running OSPF takes several tens of seconds to recover from a failure, using the current default parameter settings. The…
Expand
Highly Cited
2002
Highly Cited
2002
Bluetooth and IEEE 802.11 coexistence: analytical performance evaluation in fading channel
A. Conti
,
D. Dardari
,
G. Pasolini
,
O. Andrisano
IEEE International Symposium on Personal, Indoor…
2002
Corpus ID: 7751042
The performance in terms of the mean packet error probability (PEP) in a Rayleigh fading channel with thermal noise is…
Expand
Highly Cited
2000
Highly Cited
2000
Resource allocation for multiple classes of DS-CDMA traffic
J. Kim
,
M. Honig
IEEE Transactions on Vehicular Technology
2000
Corpus ID: 7577930
We consider a packet data direct-sequence code-division multiple-access (DS-CDMA) system which supports integrated services. The…
Expand
Highly Cited
1988
Highly Cited
1988
Traffic smoothing effects of bit dropping in a packet voice multiplexer
K. Sriram
,
D. Lucantoni
IEEE INFOCOM '88,Seventh Annual Joint Conference…
1988
Corpus ID: 16111462
The authors examine the performance of a packet voice multiplexer queue in which the less significant bits on voice packets are…
Expand
Highly Cited
1980
Highly Cited
1980
Data Traffic Performance of an Integrated Circuit- and Packet-Switched Multiplex Structure
C. Weinstein
,
M. Malpass
,
M. Fisher
IEEE Transactions on Communications
1980
Corpus ID: 62685723
Results are developed for data traffic performance in an integrated multiplex structure which includes circuit-switching for…
Expand
Highly Cited
1975
Highly Cited
1975
Steady-state analysis of a slotted and controlled Aloha system with blocking
B. Metcalfe
CCRV
1975
Corpus ID: 17440111
We assume the reader is somewhat familiar with the ongoingdevelopment of Aloha techniques as described briefly in Abramson'sFJCC…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE