Sciweavers

2562 search results - page 132 / 513
» An Internet without the Internet protocol
Sort
View
CN
2004
94views more  CN 2004»
15 years 3 months ago
A performance study of power-saving polices for Wi-Fi hotspots
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the shortage of energetic resources in mobile devices. Leg...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
CSSE
2002
IEEE
15 years 3 months ago
Characteristics of assured service and an alternative RIO scheme in differentiated services networks
Assured Service, a service model of Internet Differentiated Services (DiffServ) architecture, is not so well accommodated by the current Internet environment. This is because the I...
Seung-Joon Seok, Sung-Hyuck Lee, Jinwoo Park, Chul...
114
Voted
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 5 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
WWW
2001
ACM
16 years 4 months ago
An OAI Approach to Sharing Subject Gateway Content
The Resource Discovery Network (RDN) has taken a collaborative approach to the development of a network of subject gateways, each of which offers a variety of services to its subj...
Andy Powell
WWW
2001
ACM
16 years 4 months ago
Wireless Access to a Content Routing System
We present in this paper our experience in providing a wireless access interface to a distributed content search and delivery system. Important Wireless Application Protocol(WAP) ...
Junbiao Zhang, Remo Strotkamp