Abstract4.1. Buffer validation of application device channels4.2. Scheduler for asynchronous transfer mode flow control4.3. Route computation using Dijkstra's algorithm4.4. Ethernet monitor using bridge hardware4.5. Demultiplexing in the x-kernel4.6. Tries with node compression4.7. Packet filtering in routers4.8. Avoiding fragmentation of LSPs4.9. Policing traffic patterns4.10. Identifying a resource hog4.11. Getting rid of the TCP open connection list4.12. Acknowledgment withholding4.13. Incrementally reading a large database4.14. Binary search of long identifiers4.15. Video conferencing via asynchronous transfer modeReferences