Sciweavers

630 search results - page 122 / 126
» Acceptable internet use policy
Sort
View
BELL
2002
86views more  BELL 2002»
13 years 7 months ago
Middleboxes: Controllable media firewalls
Internet technology is promised to provide the broadband multi-service future. Today this technology can not provide basic quality guarantees for the services rendered. Generally ...
Paul Sijben, Willem van Willigenburg, Michel de Bo...
EXACT
2009
13 years 5 months ago
Explanations and Arguments Based on Practical Reasoning
In this paper a representative example is chosen that is meant be fairly simple for illustrating the point that in a very common kind of instance, argument and explanation are mixe...
Douglas Walton

Publication
255views
15 years 5 months ago
Buffer Management and Rate Guarantees for TCP/IP over Satellite-ATM Networks
Future broadband satellite networks will support a variety of service types. Many such systems are being designed with ATM or ATM like technology. A majority of Internet applicatio...
Rohit Goyal, Raj Jain, Mukul Goyal, Sonia Fahmy, B...
INFOCOM
2009
IEEE
14 years 2 months ago
A Queueing Model Framework of PCE-Based Inter-Area Path Computation
Abstract—Path computation elements (PCE’s) are used to compute end-to-end paths across multiple areas. Multiple PCE’s may be dedicated to each area to provide sufficient path...
Juanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea F...
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...