Sciweavers

5324 search results - page 1035 / 1065
» Internet Security Protocols
Sort
View
INFOCOM
2003
IEEE
14 years 27 days ago
Adaptive Data Structures for IP Lookups
— The problem of efficient data structures for IP lookups has been well studied in literature. Techniques such as LC tries and Extensible Hashing are commonly used. In this pape...
Ioannis Ioannidis, Ananth Grama, Mikhail J. Atalla...
SRDS
2003
IEEE
14 years 27 days ago
Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications
In this paper we investigate dependability issues of nextgeneration distributed multimedia applications. Examples of such applications are autonomous vehicle control, telemedicine...
Domenico Cotroneo, Cristiano di Flora, Generoso Pa...
MSWIM
2003
ACM
14 years 26 days ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...
ICNP
2002
IEEE
14 years 17 days ago
QoS Extension to BGP
To enable the end-to-end Quality of Service (QoS) guarantees in the Internet, based on the Border Gateway Protocol (BGP), inter-domain QoS advertising and routing are important. H...
Li Xiao, King-Shan Lui, Jun Wang, Klara Nahrstedt
SIGMETRICS
2010
ACM
139views Hardware» more  SIGMETRICS 2010»
14 years 13 days ago
On the flow-level dynamics of a packet-switched network
: The packet is the fundamental unit of transportation in modern communication networks such as the Internet. Physical layer scheduling decisions are made at the level of packets, ...
Ciamac Cyrus Moallemi, Devavrat Shah
« Prev « First page 1035 / 1065 Last » Next »