Sciweavers

967 search results - page 82 / 194
» COSY communication IP's
Sort
View
ICCCN
2007
IEEE
14 years 3 months ago
Evaluation of Security Protocols for the Session Initiation Protocol
— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho
INFOCOM
2005
IEEE
14 years 2 months ago
A comparative study of multicast protocols: top, bottom, or in the middle?
— Multicast solutions have been evolving from “bottom” to “top”, i.e., from IP layer (called IP multicast) to application layer (referred to as application layer multicas...
Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorin...
INFOCOM
2005
IEEE
14 years 2 months ago
Failure inferencing based fast rerouting for handling transient link and node failures
— With the emergence of Voice over IP and other real-time business applications, there is a growing demand for an IP network with high service availability. Unfortunately, in tod...
Zifei Zhong, Srihari Nelakuditi, Yinzhe Yu, Sanghw...
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
14 years 2 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
SIGCOMM
2000
ACM
14 years 1 months ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...