Sciweavers

4305 search results - page 805 / 861
» Analysing Protocol Implementations
Sort
View
EUROIMSA
2006
166views Multimedia» more  EUROIMSA 2006»
13 years 11 months ago
Advanced Multimedia Management - Control Model and Content Adaptation
The delivery and adaptation of multimedia content in distributed and heterogeneous environments requires flexible control and management mechanisms in terminals and in control ent...
Teodora Guenkova-Luy, Andreas Schorr, Franz J. Hau...
LISA
2003
13 years 11 months ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain
SIGCOMM
2010
ACM
13 years 10 months ago
Generic and automatic address configuration for data center networks
Data center networks encode locality and topology information into their server and switch addresses for performance and routing purposes. For this reason, the traditional address...
Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zh...
ADHOC
2007
135views more  ADHOC 2007»
13 years 10 months ago
Mitigating the gateway bottleneck via transparent cooperative caching in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and robust Internet access. The dominant Internet-access traffic from clients causes a congest...
Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu
AAMAS
2006
Springer
13 years 10 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara