Sciweavers

1272 search results - page 198 / 255
» Blocking in All-Optical Networks
Sort
View
122
Voted
WCNC
2008
IEEE
15 years 10 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
CSFW
2007
IEEE
15 years 10 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
147
Voted
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 10 months ago
On the WiMAX and HSDPA Coexistence
— In this work we develop Markovian models to study the dynamics of elastic calls in a cell served by HSDPA and WiMAX systems. We first present analytical models for interferenc...
Luca Sartori, Salah-Eddine Elayoubi, Benoît ...
LCN
2007
IEEE
15 years 10 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
RAID
2007
Springer
15 years 10 months ago
Advanced Allergy Attacks: Does a Corpus Really Help?
Abstract. As research in automatic signature generators (ASGs) receives more attention, various attacks against these systems are being identified. One of these attacks is the “...
Simon P. Chung, Aloysius K. Mok