Sciweavers

5324 search results - page 756 / 1065
» Internet Security Protocols
Sort
View
KIVS
2001
Springer
14 years 3 months ago
Improving the Performance of TCP on Guaranteed Bandwidth Connections
This paper discusses the performance of the Transmission Control Protocol under two aspects: First, the future Internet will provide some kind of service diļ¬€erentiation and bandw...
Hartmut Ritter, Klaus Wehrle, Lars C. Wolf
ISPAN
1999
IEEE
14 years 3 months ago
Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks
Much progress has been made toward solving the problem of routing packets inside an ad hoc network, but there are presently no complete proposals for connecting ad hoc networks to...
Josh Broch, David A. Maltz, David B. Johnson
ICNP
1998
IEEE
14 years 3 months ago
Receiver-based Multicast Scoping: A New Cost-Conscious Join/Leave Paradigm
In Internet multicast, the set of receivers can be dynamic with receivers joining and leaving a group asynchronously and without the knowledge of the sources. The Internet today u...
George F. Riley, Mostafa H. Ammar, Lenitra M. Clay
ALENEX
2003
137views Algorithms» more  ALENEX 2003»
14 years 11 days ago
The Markov Chain Simulation Method for Generating Connected Power Law Random Graphs
Graph models for real-world complex networks such as the Internet, the WWW and biological networks are necessary for analytic and simulation-based studies of network protocols, al...
Christos Gkantsidis, Milena Mihail, Ellen W. Zegur...
ICWS
2004
IEEE
14 years 10 days ago
Provisioning Resilient, Adaptive Web Services-based Workflow: A Semantic Modeling Approach
Web Services are emerging technologies that enable application-to-application communication and reuse of autonomous services over the Web. Recent efforts, OWL-S, model the semanti...
Chintan Patel, Kaustubh Supekar, Yugyung Lee