Sciweavers

244 search results - page 37 / 49
» A parameter based admission control for differentiated servi...
Sort
View
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
ESORICS
2006
Springer
13 years 11 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
BROADBAND
1998
13 years 9 months ago
CAC investigation for video and data
A key objective of ATM-based networks is to provide at the same time guaranteed QoS to real time and non-real time services. This calls for thoroughly engineered traffic control m...
E. Aarstad, Søren Blaabjerg, Fernando Cerd&...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
14 years 1 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
GLOBECOM
2007
IEEE
14 years 2 months ago
NetForecast: A Delay Prediction Scheme for Provider Controlled Networks
— Over the last years, the Internet has evolved towards becoming the dominant platform for deploying real time and multimedia services. This evolution has had as a consequence th...
Ahmed Elmokashfi, Michael Kleis, Adrian Popescu