New applications have been introduced to the today’s “best-effort” IP networks having different bandwidth and delay guarantee requirements. The IETF is currently focused on D...
Eugenia G. Nikolouzou, Petros Sampatakos, Iakovos ...
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Abstract—Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general concerns over the cost of maintaining the...
Ratul Mahajan, Miguel Castro, Antony I. T. Rowstro...
The importance of fault tolerance at the processor architecture level has been made increasingly important due to rapid advancements in the design and usage of high performance de...
T. S. Ganesh, Viswanathan Subramanian, Arun K. Som...
To accommodate heterogeneous transmission conditions in a streaming scenario several multi-rate multicast solutions have been proposed, based on simulcasting or hierarchical layer...