Sciweavers

5324 search results - page 745 / 1065
» Internet Security Protocols
Sort
View
ATC
2008
Springer
14 years 24 days ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...
ISCAPDCS
2004
14 years 11 days ago
Transnet Architecture and Logistical Networking for Distributed Storage
This paper addresses the possibility that IP, in the role of the common service, is not as general as is needed in order to directly address application requirements, including sc...
Micah Beck, Ying Ding 0002, Terry Moore, James S. ...
WSC
2004
14 years 11 days ago
On-Demand Computation of Policy Based Routes for Large-Scale Network Simulation
Routing table storage demands pose a significant obstacle for large-scale network simulation. On-demand computation of routes can alleviate those problems for models that do not r...
Michael Liljenstam, David M. Nicol
NETWORK
2008
94views more  NETWORK 2008»
13 years 11 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
TMC
2008
136views more  TMC 2008»
13 years 11 months ago
Efficient Resource Allocation for Wireless Multicast
In this paper, we propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. We reduce the bandwidth cost of an Internet Protocol (IP) multicast tree by...
De-Nian Yang, Ming-Syan Chen