Sciweavers

5324 search results - page 1008 / 1065
» Internet Security Protocols
Sort
View
SIGMETRICS
2004
ACM
108views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
Uncooperative congestion control
—Traditionally uncooperative rate control schemes have implied open loop protocols such as UDP, CBR. In this paper we show that closed loop uncooperative rate control schemes als...
Kartikeya Chandrayana, Shivkumar Kalyanaraman
IFIP
2004
Springer
14 years 1 months ago
A Framework for End-to-End QoS Context Transfer in Mobile IPv6
Providing Quality-of-Service (QoS) guarantees and mobility support for Internet devices has become a hot research topic in the Next Generation Internet research, since mobile compu...
Chuda Liu, Depei Qian, Yi Liu, Kaiping Xiao
AINA
2009
IEEE
14 years 24 days ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
IWCMC
2010
ACM
14 years 23 days ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
INFOCOM
2002
IEEE
14 years 19 days ago
Scalable IP Lookup for Programmable Routers
Abstract— Continuing growth in optical link speeds places increasing demands on the performance of Internet routers, while deployment of embedded and distributed network services...
David E. Taylor, John W. Lockwood, Todd S. Sproull...
« Prev « First page 1008 / 1065 Last » Next »