Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
Multi-tier architectures are widely used by internet applications. Guaranteeing the performance, and more generally the quality of service (QoS), of such applications remains a cr...
Abstract: In the next generation optical internet, GMPLSbased IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requir...
David Harle, Saud Albarrak, Fuead Ali, Anna Urra, ...
Spam has become a serious problem of Internet, and the current defense is limited to the filters deployed at the recipient side. Little known research has been applied to reduce ...
We develop a simulation model for the ATM ABR service, and use it to engineer ABR congestion control behavior. Although significant work has been performed on ABR rate allocation a...
Sonia Fahmy, Raj Jain, Rohit Goyal and Bobby Vanda...