Sciweavers

5324 search results - page 1011 / 1065
» Internet Security Protocols
Sort
View
CMS
2010
149views Communications» more  CMS 2010»
13 years 7 months ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
CCR
2010
179views more  CCR 2010»
13 years 7 months ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...
CN
2010
120views more  CN 2010»
13 years 7 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 7 months ago
Performance evaluation of a new route optimization technique for mobile IP
Mobile ip (mip) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other ...
Moheb R. Girgis, Tarek M. Mahmoud, Youssef S. Takr...
COMCOM
2006
81views more  COMCOM 2006»
13 years 7 months ago
A case for tree evolution in QoS multicasting
The phenomenal growth of group communications and QoS-aware applications over the Internet have accelerated the development of multicasting technologies. The Core-Based Tree (CBT) ...
Anirban Chakrabarti, G. Manimaran
« Prev « First page 1011 / 1065 Last » Next »