Sciweavers

385 search results - page 19 / 77
» A network flow based approach for network selection in dynam...
Sort
View
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 7 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
GLOBECOM
2010
IEEE
13 years 5 months ago
Maximize Secondary User Throughput via Optimal Sensing in Multi-Channel Cognitive Radio Networks
In a cognitive radio network, the full-spectrum is usually divided into multiple channels. However, due to the hardware and energy constraints, a cognitive user (also called second...
Shimin Gong, Ping Wang, Wei Liu, Wei Yuan
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
JCP
2008
190views more  JCP 2008»
13 years 7 months ago
Real-time System Identification of Unmanned Aerial Vehicles: A Multi-Network Approach
In this paper, real-time system identification of an unmanned aerial vehicle (UAV) based on multiple neural networks is presented. The UAV is a multi-input multi-output (MIMO) nonl...
Vishwas R. Puttige, Sreenatha G. Anavatti
ISCIS
2005
Springer
14 years 1 months ago
A Unified Approach to Survivability of Connection-Oriented Networks
This paper deals with problems of computer networks survivability. We present and discuss survivability aspects of Content Delivery Networks (CDNs) and other services based on the ...
Krzysztof Walkowiak