Sciweavers

8493 search results - page 1673 / 1699
» Implementing a distributed firewall
Sort
View
JSAC
2007
132views more  JSAC 2007»
13 years 8 months ago
Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks
— This paper studies the conditions under which P2P sharing can increase the capacity of IPTV services over FTTN networks. For a typical FTTN network, our study shows a) P2P shar...
Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo ...
JUCS
2007
90views more  JUCS 2007»
13 years 8 months ago
High-level Structured Interactive Programs with Registers and Voices
Abstract: A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, pro...
Alexandru Popa, Alexandru Sofronia, Gheorghe Stefa...
TWC
2008
154views more  TWC 2008»
13 years 8 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
TWC
2008
141views more  TWC 2008»
13 years 8 months ago
Progressive Accumulative Routing: Fundamental Concepts and Protocol
This paper considers a multi-hop network in which relay nodes cooperate to minimize the total energy consumed in transmitting a (unicast) packet from a source to a destination. We...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
MANSCI
2007
90views more  MANSCI 2007»
13 years 8 months ago
Selecting a Selection Procedure
Selection procedures are used in a variety of applications to select the best of a finite set of alternatives. ‘Best’ is defined with respect to the largest mean, but the me...
Jürgen Branke, Stephen E. Chick, Christian Sc...
« Prev « First page 1673 / 1699 Last » Next »