Sciweavers

584 search results - page 79 / 117
» Fundamental limitations in control over a communication chan...
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 6 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
SIGCOMM
2000
ACM
14 years 1 months ago
A stochastic model of TCP/IP with stationary random
In this paper, we present a model for TCP/IP ow control mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At that point,...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
WMI
2001
112views more  WMI 2001»
13 years 10 months ago
Quality of service and mobility for the wireless internet
Our paper explores the issue of how to provide appropriate quality of service mechanisms closely integrated with flexible mobility management in wireless local area networks. We co...
J. Antonio García-Macías, Franck Rou...
MSS
2005
IEEE
182views Hardware» more  MSS 2005»
14 years 2 months ago
Evaluation of Advanced TCP Stacks in the iSCSI Environment using Simulation Model
Enterprise storage demands have overwhelmed traditional storage mechanisms and have led to the development of Storage Area Networks (SANs). This has resulted in the design of SCSI...
Girish Motwani, K. Gopinath
ATAL
2007
Springer
14 years 26 days ago
Distributed agent-based air traffic flow management
Air traffic flow management is one of the fundamental challenges facing the Federal Aviation Administration (FAA) today. The FAA estimates that in 2005 alone, there were over 322,...
Kagan Tumer, Adrian K. Agogino