Sciweavers

967 search results - page 82 / 194
» COSY communication IP's
Sort
View
ICCCN
2007
IEEE
15 years 11 months ago
Evaluation of Security Protocols for the Session Initiation Protocol
— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho
INFOCOM
2005
IEEE
15 years 11 months ago
A comparative study of multicast protocols: top, bottom, or in the middle?
— Multicast solutions have been evolving from “bottom” to “top”, i.e., from IP layer (called IP multicast) to application layer (referred to as application layer multicas...
Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorin...
INFOCOM
2005
IEEE
15 years 11 months ago
Failure inferencing based fast rerouting for handling transient link and node failures
— With the emergence of Voice over IP and other real-time business applications, there is a growing demand for an IP network with high service availability. Unfortunately, in tod...
Zifei Zhong, Srihari Nelakuditi, Yinzhe Yu, Sanghw...
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
15 years 11 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
SIGCOMM
2000
ACM
15 years 9 months ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...