Sciweavers

95 search results - page 17 / 19
» IP Local Node Protection
Sort
View
CLUSTER
2006
IEEE
13 years 11 months ago
An Integrated Adaptive Management System for Cluster-based Web Services
The complexity of the cluster-based web service challenges the traditional approaches, which fail to guarantee the reliability and real-time performance required. In this paper, w...
Ying Jiang, Dan Meng, Chao Ren, Jianfeng Zhan
SIGCOMM
1995
ACM
13 years 11 months ago
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol
Distributedmultimedia applicationsrequire performanceguarantees from the underlying network subsystem. Ethernet has been the dominant local area network architecture in the last d...
Chitra Venkatramani, Tzi-cker Chiueh
CORR
2010
Springer
437views Education» more  CORR 2010»
13 years 4 months ago
A Distributed Cluster Scheme For Bandwidth Management In Multi-hop MANETs
Electronic collaboration among devices in a geographically localized environment is made possible with the implementation of IEEE 802.11 based wireless ad hoc networks. Dynamic na...
Binod Kumar Pattanayak, Alok Kumar Jagadev, Manoj ...
JSAC
2011
191views more  JSAC 2011»
13 years 2 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...